BoSu 1AC --- Clay Plan The United States Federal Government should restrict the President's war making authority by limiting targeted killing and detention without charge within conflict zones to declared territories and by statutory codification of executive branch review policy for those practices; and in addition, by limiting targeted killing and detention without charge outside conflict zones to reviewable operations guided by an individualized threat requirement, a least-harmful-means test, a feasibility test for criminal prosecution, procedural safeguards, and by statutory codification of executive branch review policy for those practices. 1AC – Terrorism CONTENTION 1: ALLIED COOPERATION European allies will insist on a policy that limits operations to declared zones of conflict with criminal prosecutions elsewhere---failure to codify US policy risks executive overreach Daskal 13 - Fellow and Adjunct Professor, Georgetown Center on National Security and the Law, University of Penn L. Rev., THE GEOGRAPHY OF THE BATTLEFIELD: A FRAMEWORK FOR DETENTION AND TARGETING OUTSIDE THE "HOT" CONFLICT ZONE, April, 2013, 161 U. Pa. L. Rev. 1165, Lexis The debate has largely devolved into an either-or dichotomy, even while security and practical considerations demand more nuanced practices. Thus, the United States, supported by a vocal group of scholars, including Professors Jack Goldsmith, Curtis Bradley, and Robert Chesney, has long asserted that it is at war with al Qaeda and associated groups. Therefore, it can legitimately detain without charge - and kill - al Qaeda members and their associates wherever they are found, subject of course to additional law-of-war, constitutional, and sovereignty constraints. n9 Conversely, European [*1170] allies, supported by an equally vocal group of scholars and human rights advocates, assert that the United States is engaged in a conflict with al Qaeda only in specified regions, and that the United States' authority to employ law-of-war detention and lethal force extends only to those particular zones. n10 In all other places, al Qaeda and its associates should be subject to [*1171] law enforcement measures, as governed by international human rights law and the domestic laws of the relevant states. n11 Recent statements by United States officials suggest an attempt to mediate between these two extremes, at least for purposes of targeted killing, and as a matter of policy, not law. While continuing to assert a global conflict with al Qaeda, official statements have limited the defense of out-of-conflict zone targeting operations to high-level leaders and others who pose a "significant" threat. n12 In the words of President Obama's then-Assistant for Homeland Security and Counterterrorism, John O. Brennan, the United States does not seek to "eliminate every single member of al-Qaida That said, the United States continues to suggest that it can, as a matter of law, "take action" against anyone who is "part of" al Qaeda or associated forces - a very broad category of persons - without any explicit geographic limits. n14 The stakes are high. If the United States were permitted to launch a drone strike against an alleged al Qaeda operative in Yemen, why not in London - so long in the world," but instead conducts targeted strikes to mitigate "actual[,] ongoing threats." n13 as the United States had the United Kingdom's consent and was confident that collateral damage to nearby civilians would be minimal (thereby addressing sovereignty and There are many reasons why such a scenario is unlikely, but the United [*1172] States has yet to assert any limiting principle that would, as a matter of law, prohibit such actions. And in fact, the United States did rely on the laws of war to detain a U.S. citizen picked up in a Chicago airport for almost four years. n15 Even if one accepts the idea that the United States now exercises its asserted authority with appropriate restraint, what is to prevent Russia, for example, from asserting that it is engaged in an armed conflict with Chechens and that it can target or detain, without charge, an alleged member of a Chechen rebel group wherever he or she is found, including possibly in the United States? Conversely, it cannot be the case - as the extreme version of the territorially restricted view proportionality concerns)? of the conflict suggests - that an enemy with whom a state is at war can merely cross a territorial boundary in order to plan or plot, free from the threat of being captured or killed. In the London example, law enforcement can and should respond effectively to the threat. n16 But there also will be instances in which the enemy escapes to an effective safe haven because the host state is unable or unwilling to respond to the threat (think Yemen and Somalia in the current conflict), capture operations are infeasible because of conditions on the ground (think parts of Yemen and Somalia again), or criminal prosecution is not possible, at least in the short run. This Article proposes a way forward - a new legal framework for thinking about the geography of the conflict in a way that better mediates the multifaceted liberty, security, and foreign policy interests at stake. It argues that the jus ad bellum questions about the offering geographic borders of the conflict that have dominated much of the literature are the wrong questions to focus on. Rather, it focuses on jus in bello questions about the conduct the conflict extends to wherever the enemy threat is found, but argues for more stringent rules of conduct outside zones of active hostilities. Specifically, it proposes a series of substantive and procedural rules designed to limit the use of lethal targeting [*1173] and detention outside zones of active hostilities - subjecting their use to an individualized threat finding, a least-harmful-means test, and meaningful procedural safeguards. n17 The Article does not claim that existing law, which is uncertain and contested, dictates this approach. (Nor does it preclude this approach.) Rather, the Article explicitly recognizes that the set of current rules, developed mostly in response to state-on-state conflicts in a world without drones, fails to address adequately the complicated security and liberty issues presented by conflicts between a state and mobile nonof hostilities. This Article assumes that state actors in a world where technological advances allow the state to track and attack the enemy wherever he is found. New rules are needed. Drawing on evolving state practice, underlying principles of the law of war, and prudential policy considerations, the Article proposes a set of such rules for conflicts between states and transnational non-state actors - rules designed both to promote the the legal framework under which the United States is currently operating has generated legitimate concerns about the creep of war. This Part outlines how the U.S. approach over the past several years has led to a polarized debate between opposing state's security and legitimacy and to protect against the erosion of individual liberty and the rule of law. The Article proceeds in four parts. Part I describes how visions of a territorially broad and territorially restricted conflict, and how both sides of the debate have failed to [*1174] acknowledge the legitimate substantive concerns of the a territorially broad conflict can and should distinguish between zones of active hostilities and elsewhere, thus laying out the broad framework under which the Article's proposal rests. Part III details the proposed zone approach. It distinguishes zones of active hostilities from both peacetime and lawless zones, and outlines the enhanced substantive and procedural standards that ought to apply in the latter two zones. Specifically, Part III argues that outside zones of active hostilities, law-of-war detention and use of force should be employed only in exceptional situations, subject to an individualized threat finding, least-harmful-means test, and meaningful procedural safeguards. n18 This Part also describes how such an approach maps onto the conflict with al Qaeda, and is, at least in several key ways, consistent with the approach already taken by the United States as a matter of policy. Finally, Part IV explains how such an approach ought to apply not just to the current conflict with al Qaeda but to other conflicts with transnational non-state actors in the future, as well as self-defense actions that take place outside the scope of other. Part II explains why armed conflict. It concludes by making several recommendations as to how this approach should be incorporated into U.S. and, ultimately, international law. The Article is United States-focused, and is so for a reason. To be sure, other states, most notably Israel, have engaged in armed conflicts with non-state actors that are dispersed across the United States is the first state to self-consciously declare itself at war with a non-state terrorist organization that potentially spans the globe. Its actions and asserted authorities in response to this threat establish a reference point for state practice that will likely be mimicked by others and inform the development of customary international law. several states or territories. n19 But Alignment with allies brings detention policy into compliance with laws--makes criminal prosecutions effective outside zones of conflict Hathaway 13, Gerard C. and Bernice Latrobe Smith Professor of International Law Yale Law School); Samuel Adelsberg (J.D. candidate at Yale Law School); Spencer Amdur (J.D. candidate at Yale Law School); Freya Pitts (J.D. candidate at Yale Law School); Philip Levitz (J.D. from Yale Law School); and Sirine Shebaya (J.D. from Yale Law School), “The Power To Detain: Detention of Terrorism Suspects After 9/11”, The Yale Journal of International Law, Vol. 38, 2013. There is clear evidence that other countries recognize and respond to the difference in legitimacy between civilian and military courts and that they are, indeed, more willing to cooperate with U.S. counterterrorism efforts when terrorism suspects are tried in the criminal justice system. Increased international cooperation is therefore another advantage of criminal prosecution. ¶ Many key U.S. allies have been unwilling to cooperate in cases involving law-of-war detention or prosecution but have cooperated in criminal [*166] prosecutions. In fact, many U.S. extradition treaties, including those with allies such as India and Germany, forbid extradition when the defendant will not be tried in a criminal court. n252 This issue has played out in practice several times. An al-Shabaab operative was extradited from the Netherlands only after assurances from the United States that he would be prosecuted in criminal court. n253 Two similar cases arose in 2007. n254 In perhaps the most striking example, five terrorism suspects - including Abu Hamza al-Masr, who is accused of providing material support to al-Qaeda by trying to set up a training camp in Oregon and of organizing support for the Taliban in Afghanistan - were extradited to the United States by the United Kingdom in October 2012. n255 The extradition was made on the express condition that they would be tried in civilian federal criminal courts rather than in the military commissions. n256 And, indeed, both the European Court of Human Rights and the British courts allowed the extradition to proceed after assessing the protections offered by the U.S. federal criminal justice system and finding they fully met all relevant standards. n257 An insistence on using military commissions may thus hinder extradition and other kinds of international prosecutorial cooperation, such as the sharing of testimony and evidence. ¶ Finally, the criminal justice system is simply a more agile and versatile prosecution forum. Federal jurisdiction offers an extensive variety of antiterrorism statutes that can be marshaled to prosecute terrorist activity committed outside the United States, and subsequently to detain those who are convicted. n258 This greater variety of offenses - military commissions can only [*167] punish an increasingly narrow set of traditional offenses against the laws of war n259 offers prosecutors important flexibility. For instance, it might be very difficult to prove al-Qaeda membership in an MCA prosecution or a law-of-war habeas proceeding; but if the defendant has received training at a terrorist camp or participated in a specific terrorist act, federal prosecutors may convict under various statutes tailored to more specific criminal behavior. n260 In addition, military commissions can no longer hear prosecutions for material support committed before 2006. n261 Due in part to the established track record of the federal courts, the federal criminal justice system also allows for more flexible interactions between prosecutors and defendants. Proffer and plea agreements are powerful incentives for defendants to cooperate, and often lead to valuable intelligence-gathering, producing more intelligence over the course of prosecution. n262 That solves safe havens and extradition to the US court system David S. Kris 11 – Former Assistant Attorney General for National Security at the U.S. Department of Justice, Law Enforcement as a Counterterrorism Tool, Assistant Attorney General for National Security at the U.S. Department of Justice, from March 2009 to March 2011, Journal of Security Law & Policy, Vol5:1. 2011, http://jnslp.com//wpcontent/uploads/2011/06/01_David-Kris.pdf Finally, the criminal justice system may help us obtain important cooperation from other countries. That cooperation may be necessary if we want to detain suspected terrorists¶ or otherwise accomplish our national¶ security objectives. Our federal courts are well-respected internationally.¶ They are well-established, formal legal mechanisms that allow the transfer of terrorism suspects to the United States¶ for trial in federal court, and for¶ the provision of information to assist¶ in law enforcement investigations –¶ i.e., extradition and mutual legal assistance treaties (MLATs). Our allies around the world are comfortable with these mechanisms, as well as with more informal procedures that are often used to provide assistance to the United States in law enforcement matters, whether relating to terrorism or¶ other types of cases. Such cooperation can be critical to the success of a prosecution, and in some cases can be the only way in which we will gain custody of a suspected terrorist who has broken our laws.¶ 184¶ In contrast, many of our key allies around the world are not willing to cooperate with or support our efforts to hold suspected terrorists in law of war detention or to prosecute them in military commissions. While we hope that over time they will grow more supportive of these legal¶ mechanisms, at present many countries would not extradite individuals to the United States for military commission proceedings or law of war¶ detention. Indeed, some of our extradition treaties explicitly forbid extradition to the United States where the person will be tried in a forum other than a criminal court. For example, our treaties with Germany¶ (Article 13)¶ 185¶ and with Sweden (Article V(3))¶ 186¶ expressly forbid extradition¶ when the defendant will be tried in¶ an “extraordinary” court, and the¶ understanding of the Indian government pursuant to its treaty with the¶ United States is that extradition is available only for proceedings under the ¶ ordinary criminal laws of the requesting state.¶ 187¶ More generally, the¶ doctrine of dual criminality – under which extradition is available only for¶ offenses made criminal in both countries – and the relatively common¶ exclusion of extradition for military offenses not also punishable in civilian ¶ court may also limit extradition outside the criminal justice system.¶ 188¶ Apart¶ from extradition, even where we already have the terrorist in custody, many countries will not provide testimony, other information, or assistance in support of law of war detention or a military prosecution, either as a matter¶ of national public policy or under other provisions of some of our MLATs.¶ 189¶ These concerns are not hypothetical. During the last Administration, ¶ the United States was obliged to give¶ assurances against the use of military¶ commissions in order to obtain extradition of several terrorism suspects to¶ the United States.¶ 190¶ There are a number of terror suspects currently in foreign custody who likely would not be extradited to the United States by¶ foreign nations if they faced military tribunals.¶ 191¶ In some of these cases, it might be necessary for the foreign nation to release these suspects if they cannot be extradited because they do¶ not face charges pending in the¶ foreign nation. Allied cooperation’s key to effective counter-terrorism Micah Zenko 13, Douglas Dillon fellow with the Center for Preventive Action at the Council on Foreign Relations, Newsday, January 30, "Zenko: Why we can't just drone Algeria", http://www.newsday.com/opinion/oped/zenko-why-we-can-t-just-drone-algeria-1.4536641 CNN should not have been surprised. Neither the Bush nor Obama administrations received blanket permission to transit Algerian airspace with surveillance planes or drones; instead, they received authorization only on a case-by-case basis and with advance notice.¶ According to Washington Post journalist Craig Whitlock, the U.S. military relies on a fleet of civilian-looking unarmed aircraft to spy on suspected Islamist groups in North Africa, because they are less conspicuous - and therefore less politically sensitive for host nations - than drones. Moreover, even if the United States received flyover rights for armed drones, it has been unable to secure a base in southern Europe or northern Africa from which it would be permitted to conduct drone strikes; and presently, U.S. armed drones cannot be launched and recovered from naval platforms.¶ According to Hollywood movies or television dramas, with its immense intelligence collection and military strike capabilities, the United States can locate, track, and kill anyone in the world.¶ This misperception is continually reinvigorated by the White House's, the CIA's, and the Pentagon's close cooperation with movie and television studios. For example, several years before the CIA even started conducting non-battlefield drone strikes, it was recommending the tactic as a plotline in the short-lived (2001-2003) drama "The Agency." As the show's writer and producer later revealed: "The Hellfire missile thing, they suggested that. I didn't come up with this stuff. I think they were doing a public opinion poll by virtue of giving me some good ideas." ¶ Similarly, as of November there were at least 10 movies about the Navy SEALs in production or in theaters, which included so much support from the Pentagon that one film even starred active-duty SEALs.¶ The Obama administration's lack of a military response in Algeria reflects how sovereign states routinely constrain U.S. intelligence and military activities. As the U.S. Air Force Judge Advocate General's Air Force Operations and the Law guidebook states: "The unauthorized or improper entry of foreign aircraft into a state's national airspace is a violation of that state's sovereignty. . . . Except for overflight of international straits and archipelagic sea lanes, all nations have complete discretion in regulating or prohibiting flights within their national airspace."¶ Though not sexy and little reported, deploying CIA drones or special operations forces requires constant behind-the-scenes diplomacy: with very rare exceptions - like the Bin Laden raid - the U.S. military follows the rules of the world's other 194 sovereign, independent states.¶ These rules come in many forms. For example, basing rights agreements can limit the number of civilian, military and contractor personnel at an airbase or post; what access they have to the electromagnetic spectrum; what types of aircraft they can fly; how many sorties they can conduct per day; when those sorties can occur and how long they can last; whether the aircraft can drop bombs on another country and what sort of bombs; and whether they can use lethal force in self-defense. When the United States led the enforcement of the northern no-fly zone over Iraq from the Incirlik Air Base in southern Turkey from 1991 to 2003, a Turkish military official at the rank of lieutenant colonel or higher was always on board U.S. Air Force AWACS planes, monitoring the airspace to assure that the United States did not violate its highly restrictive basing agreement. ¶ As Algeria is doing presently, the denial or approval of overflight rights is a powerful tool that states can impose on the United States. These include where U.S. air assets can enter and exit another state, what flight path they may take, how high they must fly, what type of planes can be included in the force package, and what sort of missions they can execute. In addition, these constraints include what is called shutter control, or the limits to when and how a transiting aircraft can collect information. For example, U.S. drones that currently fly out of the civilian airfield in Arba Minch, Ethiopia, to Somalia, are restricted in their collection activities over Ethiopia's Ogaden region, where the government has conducted an intermittent counterinsurgency against the Ogaden National Liberation Front. That disrupts leadership and makes carrying out attacks impossible Kenneth Anderson 13, Professor of International Law at American University, June 2013, “The Case for Drones,” Commentary, Vol. 135, No. 6 Targeted killing of high-value terrorist targets, by contrast, is the end result of a long, independent intelligence process. What the drone adds to that intelligence might be considerable, through its surveillance capabilities -but much of the drone's contribution will be tactical, providing intelligence that assists in the planning and execution of the strike itself, in order to pick the moment when there might be the fewest civilian casualties . Nonetheless, in conjunction with high-quality intelligence, drone warfare offers an unparalleled means to strike directly at terrorist organizations without needing a conventional or counterinsurgency approach to reach terrorist groups in their safe havens. It offers an offensive capability, rather than simply defensive measures, such as homeland security alone. Drone warfare offers a raiding strategy directly against the terrorists and their leadership. If one believes, as many of the critics of drone warfare do, that the proper strategies of counterterrorism are essentially defensive -including those that eschew the paradigm of armed conflict in favor of law enforcement and criminal law -- then the strategic virtue of an offensive capability against the terrorists themselves will seem small. But that has not been American policy since 9/11, not under the Bush administration, not under the Obama administration -- and not by the Congress of the United States, which has authorized hundreds of billions of dollars to fight the war on terror aggressively. The United States has used many offensive methods in the past dozen years: Regime change of states offering safe havens, counter-insurgency war, special operations, military and intelligence assistance to regimes battling our common enemies are examples of the methods that are just of military nature. Drone warfare today is integrated with a much larger strategic counterterrorism target -- one in which, as in Afghanistan in the late 1990s, radical Islamist groups seize governance of whole populations and territories and provide not only safe haven, but also an honored central role to transnational terrorist groups. This is what current conflicts in Yemen and Mali threaten, in counterterrorism terms, and why the United States, along with France and even the UN, has moved to intervene militarily. Drone warfare is just one element of overall strategy, but it has a clear utility in disrupting terrorist leadership . It makes the planning and execution of complex plots difficult if only because it is hard to plan for years down the road if you have some reason to think you will be struck down by a drone but have no idea when. The unpredictability and terrifying anticipation of sudden attack, which terrorists have acknowledged in communications, have a significant impact on planning and organizational effectiveness . Risk of nuclear terrorism is real and high now Bunn et al 10/2/13 Matthew, Valentin Kuznetsov, Martin B. Malin, Yuri Morozov, Simon Saradzhyan, William H. Tobey, Viktor I. Yesin, and Pavel S. Zolotarev. "Steps to Prevent Nuclear Terrorism." Paper, Belfer Center for Science and International Affairs, Harvard Kennedy School, October 2, 2013, Matthew Bunn. Professor of the Practice of Public Policy at Harvard Kennedy School andCo-Principal Investigator of Project on Managing the Atom at Harvard University’s Belfer Center for Science and International Affairs. • Vice Admiral Valentin Kuznetsov (retired Russian Navy). Senior research fellow at the Institute for U.S. and Canadian Studies of the Russian Academy of Sciences, Senior Military Representative of the Russian Ministry of Defense to NATO from 2002 to 2008. • Martin Malin. Executive Director of the Project on Managing the Atom at the Belfer Center for Science and International Affairs. • Colonel Yuri Morozov (retired Russian Armed Forces). Professor of the Russian Academy of Military Sciences and senior research fellow at the Institute for U.S. and Canadian Studies of the Russian Academy of Sciences, chief of department at the Center for Military-Strategic Studies at the General Staff of the Russian Armed Forces from 1995 to 2000. • Simon Saradzhyan. Fellow at Harvard University’s Belfer Center for Science and International Affairs, Moscow-based defense and security expert and writer from 1993 to 2008. • William Tobey. Senior fellow at Harvard University’s Belfer Center for Science and International Affairs and director of the U.S.-Russia Initiative to Prevent Nuclear Terrorism, deputy administrator for Defense Nuclear Nonproliferation at the U.S. National Nuclear Security Administration from 2006 to 2009. • Colonel General Viktor Yesin (retired Russian Armed Forces). Leading research fellow at the Institute for U.S. and Canadian Studies of the Russian Academy of Sciences and advisor to commander of the Strategic Missile Forces of Russia, chief of staff of the Strategic Missile Forces from 1994 to 1996. • Major General Pavel Zolotarev (retired Russian Armed Forces). Deputy director of the Institute for U.S. and Canadian Studies of the Russian Academy of Sciences, head of the Information and Analysis Center of the Russian Ministry of Defense from1993 to 1997, section head - deputy chief of staff of the Defense Council of Russia from 1997 to 1998.http://belfercenter.ksg.harvard.edu/publication/23430/steps_to_prevent_nuclear_terror ism.html I. Introduction In 2011, Harvard’s Belfer Center for Science and International Affairs and the Russian Academy of Sciences’ Institute for U.S. and Canadian Studies published “The U.S. – Russia Joint Threat Assessment on Nuclear Terrorism.” The assessment analyzed the means, motives, and access of would-be nuclear terrorists, and concluded that the threat of nuclear terrorism is urgent and real. The Washington and Seoul Nuclear Security Summits in 2010 and 2012 established and demonstrated a consensus among political leaders from around the world that nuclear terrorism poses a serious threat to the peace, security, and prosperity of our planet. For any country, a terrorist attack with a nuclear device would be an immediate and catastrophic disaster, and the negative effects would reverberate around the world far beyond the location and moment of the detonation. Preventing a nuclear terrorist attack requires international cooperation to secure nuclear materials, especially among those states producing nuclear materials and weapons. As the world’s two greatest nuclear powers, the United States and Russia have the greatest experience and capabilities in securing nuclear materials and plants and, therefore, share a special responsibility to lead international efforts to prevent terrorists from seizing such materials and plants. The depth of convergence between U.S. and Russian vital national interests on the issue of nuclear security is best illustrated by the fact that bilateral cooperation on this issue has continued uninterrupted for more than two decades, even when relations between the two countries occasionally became frosty, as in the aftermath of the August 2008 war in Georgia. Russia and the United States have strong incentives to forge a close and trusting partnership to prevent nuclear terrorism and have made enormous progress in securing fissile material both at home and in partnership with other countries. However, to meet the evolving threat posed by those individuals intent upon using nuclear weapons for terrorist purposes, the United States and Russia need to deepen and broaden their cooperation. The 2011 “U.S. - Russia Joint Threat Assessment” offered both specific conclusions about the nature of the threat and general observations about how it might be addressed. This report builds on that foundation and analyzes the existing framework for action, cites gaps and deficiencies, and makes specific recommendations for improvement. “The U.S. – Russia Joint Threat Assessment on Nuclear Terrorism” (The 2011 report executive summary): • Nuclear terrorism is a real and urgent threat. Urgent actions are required to reduce the risk. The risk is driven by the rise of terrorists who seek to inflict unlimited damage, many of whom have sought justification for their plans in radical interpretations of Islam; by the spread of information about the decades-old technology of nuclear weapons; by the increased availability of weapons-usable nuclear materials; and by globalization, which makes it easier to move people, technologies, and materials across the world. • Making a crude nuclear bomb would not be easy, but is potentially within the capabilities of a technically sophisticated terrorist group, as numerous government studies have confirmed. Detonating a stolen nuclear weapon would likely be difficult for terrorists to accomplish, if the weapon was equipped with modern technical safeguards (such as the electronic locks known as Permissive Action Links, or PALs). Terrorists could, however, cut open a stolen nuclear weapon and make use of its nuclear material for a bomb of their own. • The nuclear material for a bomb is small and difficult to detect, making it a major challenge to stop nuclear smuggling or to recover nuclear material after it has been stolen. Hence, a primary focus in reducing the risk must be to keep nuclear material and nuclear weapons from being stolen by continually improving their security, as agreed at the Nuclear Security Summit in Washington in April 2010. • Al-Qaeda has sought nuclear weapons for almost two decades. The group has repeatedly attempted to purchase stolen nuclear material or nuclear weapons, and has repeatedly attempted to recruit nuclear expertise. AlQaeda reportedly conducted tests of conventional explosives for its nuclear program in the desert in Afghanistan. The group’s nuclear ambitions continued after its dispersal following the fall of the Taliban regime in Afghanistan. Recent writings from top al-Qaeda leadership are focused on justifying the mass slaughter of civilians, including the use of weapons of mass destruction, and are in all likelihood intended to provide a formal religious justification for nuclear use. While there are significant gaps in coverage of the group’s activities, al-Qaeda appears to have been frustrated thus far in acquiring a nuclear capability; it is unclear whether the the group has acquired weapons-usable nuclear material or the expertise needed to make such material into a bomb. Furthermore, pressure from a broad range of counter-terrorist actions probably has reduced the group’s ability to manage large, complex projects, but has not eliminated the danger. However, there is no sign the group has abandoned its nuclear ambitions. On the contrary, leadership statements as recently as 2008 indicate that the intention to acquire and use nuclear weapons is as strong as ever. Nuclear terrorism is feasible---high risk of theft and attacks escalate Vladimir Z. Dvorkin 12 Major General (retired), doctor of technical sciences, professor, and senior fellow at the Center for International Security of the Institute of World Economy and International Relations of the Russian Academy of Sciences. The Center participates in the working group of the U.S.-Russia Initiative to Prevent Nuclear Terrorism, 9/21/12, "What Can Destroy Strategic Stability: Nuclear Terrorism is a Real Threat," belfercenter.ksg.harvard.edu/publication/22333/what_can_destroy_strategic_stability.html Hundreds of scientific papers and reports have been published on nuclear terrorism. International conferences have been held on this threat with participation of Russian organizations, including IMEMO and the Institute of U.S. and Canadian Studies. Recommendations on how to combat the threat have been issued by the International Luxembourg Forum on Preventing Nuclear Catastrophe, Pugwash Conferences on Science and World Affairs, Russian-American Elbe Group, and other organizations. The UN General Assembly adopted the International Convention for the Suppression of Acts of Nuclear Terrorism in 2005 and cooperation among intelligence services of leading states in this sphere is developing.¶ At the same time, these efforts fall short for a number of reasons, partly because various acts of nuclear terrorism are possible. Dispersal of radioactive material by detonation of conventional explosives (“dirty bombs”) is a method that is most accessible for terrorists. With the wide spread of radioactive sources, raw materials for such attacks have become much more accessible than weapons-useable nuclear material or nuclear weapons. The use of “dirty bombs” will not cause many immediate casualties, but it will result into long-term radioactive contamination, contributing to the spread of panic and socio-economic destabilization.¶ Severe consequences can be caused by sabotaging nuclear power plants, research reactors, and radioactive materials storage facilities. Large cities are especially vulnerable to such attacks. A large city may host dozens of research reactors with a nuclear power plant or a couple of spent nuclear fuel storage facilities and dozens of large radioactive materials storage facilities located nearby. The past few years have seen significant efforts made to enhance organizational and physical aspects of security at facilities, especially at nuclear power plants. Efforts have also been made to improve security culture. But these efforts do not preclude the possibility that well-trained terrorists may be able to penetrate nuclear facilities.¶ Some estimates show that sabotage of a research reactor in a metropolis may expose hundreds of thousands to high doses of radiation. A formidable part of the city would become uninhabitable for a long time.¶ Of all the scenarios, it is building an improvised nuclear device by terrorists that poses the maximum risk. There are no engineering problems that cannot be solved if terrorists decide to build a simple “gun-type” nuclear device. Information on the design of such devices, as well as implosion-type devices, is available in the public domain. It is the acquisition of weapons-grade uranium that presents the sole serious obstacle. Despite numerous preventive measures taken, we cannot rule out the possibility that such materials can be bought on the black market. Theft of weapons-grade uranium is also possible. Research reactor fuel is considered to be particularly vulnerable to theft, as it is scattered at sites in dozens of countries. There are about 100 research reactors in the world that run on weapons-grade uranium fuel, according to the International Atomic Energy Agency (IAEA).¶ A terrorist “gun-type” uranium bomb can have a yield of least 10-15 kt, which is comparable to the yield of the bomb dropped on Hiroshima. The explosion of such a bomb in a modern metropolis can kill and wound hundreds of thousands and cause serious economic damage. There will also be long-term sociopsychological and political consequences.¶ The vast majority of states have introduced unprecedented security and surveillance measures at transportation and other large-scale public facilities after the terrorist attacks in the United States, Great Britain, Italy, and other countries. These measures have proved burdensome for the countries’ populations, but the public has accepted them as necessary. A nuclear terrorist attack will make the public accept further measures meant to enhance control even if these measures significantly restrict the democratic liberties they are accustomed to. Authoritarian states could be expected to adopt even more restrictive measures.¶ If a nuclear terrorist act occurs, nations will delegate tens of thousands of their secret services’ best personnel to investigate and attribute the attack. Radical Islamist groups are among those capable of such an act. We can imagine what would happen if they do so, given the anti-Muslim sentiments and resentment that conventional terrorist attacks by Islamists have generated in developed democratic countries. Mass deportation of the nonindigenous population and severe sanctions would follow such an attack in what will cause violent protests in the Muslim world. Series of armed clashing terrorist attacks may follow. The prediction that Samuel Huntington has made in his book “The Clash of Civilizations and the Remaking of World Order” may come true. Huntington’s book clearly demonstrates that it is not Islamic extremists that are the cause of the Western world’s problems. Rather there is a deep, intractable conflict that is rooted in the fault lines that run between Islam and Christianity. This is especially dangerous for Russia because these fault lines run across its territory. To sum it up, the political leadership of Russia has every reason to revise its list of factors that could undermine strategic stability. BMD does not deserve to be even last on that list because its effectiveness in repelling massive missile strikes will be extremely low. BMD systems can prove useful only if deployed to defend against launches of individual ballistic missiles or groups of such missiles. Prioritization of other destabilizing factors—that could affect global and regional stability—merits a separate study or studies. But even without them I can conclude that nuclear terrorism should be placed on top of the list. The threat of nuclear terrorism is real, and a successful nuclear terrorist attack would lead to a radical transformation of the global order. All of the threats on the revised list must become a subject of thorough studies by experts. States need to work hard to forge a common understanding of these threats and develop a strategy to combat them. Extinction---equivalent to full-scale nuclear war Owen B. Toon 7, chair of the Department of Atmospheric and Oceanic Sciences at CU-Boulder, et al., April 19, 2007, “Atmospheric effects and societal consequences of regional scale nuclear conflicts and acts of individual nuclear terrorism,” online: http://climate.envsci.rutgers.edu/pdf/acp-7-1973-2007.pdf To an increasing extent, people are congregating in the world’s great urban centers, creating megacities with populations exceeding 10 million individuals. At the same time, advanced technology has designed nuclear explosives of such small size they can be easily transported in a car, small plane or boat to the heart of a city. We demonstrate here that a single detonation in the 15 kiloton range can produce urban fatalities approaching one million in some cases, and casualties exceeding one million. Thousands of small weapons still exist in the arsenals of the U.S. and Russia, and there are at least six other countries with substantial nuclear weapons inventories. In all, thirty-three countries control sufficient amounts of highly enriched uranium or plutonium to assemble nuclear explosives. A conflict between any of these countries involving 50-100 weapons with yields of 15 kt has the potential to create fatalities rivaling those of the Second World War. Moreover, even a single surface nuclear explosion, or an air burst in rainy conditions, in a city center is likely to cause the entire metropolitan area to be abandoned at least for decades owing to infrastructure damage and radioactive contamination. As the aftermath of hurricane Katrina in Louisiana suggests, the economic consequences of even a localized nuclear catastrophe would most likely have severe national and international economic consequences. Striking effects result even from relatively small nuclear attacks because low yield detonations are most effective against city centers where business and social activity as well as population are concentrated. Rogue nations and terrorists would be most likely to strike there. Accordingly, an organized attack on the U.S. by a small nuclear state, or terrorists supported by such a state, could generate casualties comparable to those once predicted for a full-scale nuclear “counterforce” exchange in a superpower conflict. Remarkably, the estimated quantities of smoke generated by attacks totaling about one megaton of nuclear explosives could lead to significant global climate perturbations (Robock et al., 2007). While we did not extend our casualty and damage predictions to include potential medical, social or economic impacts following the initial explosions, such analyses have been performed in the past for large-scale nuclear war scenarios (Harwell and Hutchinson, 1985). Such a study should be carried out as well for the present scenarios and physical outcomes. Nuclear terrorism causes extinction --- high probability Hellman 8 [Martin E. Hellman, Professor @ Stanford, “Risk Analysis of Nuclear Deterrence” SPRING 2008 THE BENT OF TAU BETA PI, http://www.nuclearrisk.org/paper.pdf] The threat of nuclear terrorism looms much larger in the public’s mind than the threat of a full-scale nuclear war, yet this article focuses primarily on the latter. An explanation is therefore in order before proceeding. A terrorist attack involving a nuclear weapon would be a catastrophe of immense proportions: “A 10-kiloton bomb detonated at Grand Central Station on a typical work day would likely kill some half a million people, and inflict over a trillion dollars in direct economic damage. The likelihood of such an attack is also significant. Former Secretary of Defense William Perry has estimated the chance of a nuclear terrorist incident within the next decade to be roughly 50 percent [Bunn 2007, page 15]. David Albright, a former weapons inspector in America and its way of life would be changed forever.” [Bunn 2003, pages viii-ix]. Iraq, estimates those odds at less than one percent, but notes, “We would never accept a situation where the chance of a major nuclear accident like Chernobyl would be anywhere near 1% .... A nuclear terrorism attack is a low-probability event, but we can’t live in a world where it’s anything but extremely low-probability.” [Hegland 2005]. In a survey of 85 national security experts, Senator Richard Lugar found a median estimate of 20 percent for the “probability of an attack involving a nuclear explosion occurring somewhere in the world in the next 10 years,” with 79 percent of the respondents believing “it more likely to be carried out by terrorists” than by a government [Lugar 2005, pp. 14-15]. I support increased efforts to reduce the threat of nuclear terrorism, but that is not inconsistent with the approach of this article. Because terrorism is one of the potential trigger mechanisms for a full-scale nuclear war, the risk analyses proposed herein will include estimating the risk of nuclear terrorism as one component of the overall risk. If that risk, the overall risk, or both are found to be unacceptable, then the proposed remedies would be directed to reduce which- ever risk(s) warrant attention. Similar remarks apply to a number of other threats (e.g., nuclear war between the U.S. and China over Taiwan). his article would be incomplete if it only dealt with the threat of nuclear terrorism and neglected the threat of full- scale nuclear war. If both risks are unacceptable, an effort to reduce only the terrorist component would leave humanity in great peril. In fact, society’s almost total neglect of the threat of full-scale nuclear war makes studying that risk all the more important. The cosT of World War iii The danger associated with nuclear deterrence depends on both the cost of a failure and the failure rate.3 This section explores the cost of a failure of nuclear deterrence, and the next section is concerned with the failure rate. While other definitions are possible, this article defines a failure of deterrence to mean a full-scale exchange of all nuclear weapons available to the U.S. and Russia, an event that will be termed World War III. Approximately 20 million people died as a result of the first World War. World War II’s fatalities were double or triple that number—chaos prevented a more precise deter- mination. In both cases humanity recovered, and the world today bears few scars that attest to the horror of those two wars. Many people therefore implicitly believe that a third World War would be horrible but survivable, an extrapola- tion of the effects of the first two global wars. In that view, World War III, while horrible, is something that humanity may just have to face and from which it will then have to recover. In contrast, some of those most qualified to assess the situation hold a very different view. In a 1961 speech to a joint session of the Philippine Con- gress, General Douglas MacArthur, stated, “Global war has become a Frankenstein to destroy both sides. … If you lose, you are annihilated. If you win, you stand only to lose. No longer does it possess even the chance of the winner of a duel. It contains now only the germs of double suicide.” Former Secretary of Defense Robert McNamara expressed a similar view: “If deterrence fails and conflict develops, the present U.S. and NATO strategy carries with it a high risk that Western civilization will be destroyed” [McNamara 1986, page 6]. More recently, George Shultz, William Perry, Henry Kissinger, and Sam Nunn4 echoed those concerns when they quoted President Reagan’s belief that nuclear weapons were “totally irrational, totally inhumane, good for nothing but killing, possibly destructive of life on earth and civilization.” [Shultz 2007] Official studies, while couched in less emotional terms, still convey the horrendous toll that World War III would exact: “ The beyond any precedent. Executive branch calculations show a range of resulting deaths would be far U.S. deaths from 35 to 77 percent (i.e., 79-160 million dead) … a change in targeting could kill somewhere between 20 million and 30 million additional people on each side .... These calculations reflect only deaths during the first 30 days. Additional millions would be injured, and many would eventually die from lack of adequate medical care … millions of people might starve or freeze during the follow- ing winter, but it is not possible to estimate how many. … further millions … might eventually die of latent radiation effects.” [OTA 1979, page 8] This OTA report also noted the possibility of serious ecological damage [OTA 1979, page 9], a concern that as- sumed a new potentiality when the TTAPS report [TTAPS 1983] proposed that the ash and dust from so many nearly simultaneous nuclear explosions and their resultant fire- storms could usher in a nuclear winter that might erase homo sapiens from the face of the earth, much as many scientists now believe the K-T Extinction that wiped out the dinosaurs resulted from an impact winter caused by ash and dust from a large asteroid or comet striking Earth. The TTAPS report produced a heated debate, and there is still no scientific consensus on whether a nuclear winter would follow a full-scale nuclear war. Recent work [Robock 2007, Toon 2007] suggests that even a limited nuclear exchange or one between newer nuclear-weapon states, such as India and Pakistan, could have devastating long-lasting climatic consequences due to the large volumes of smoke that would be generated by fires in modern megacities. While it is uncertain how destructive World War III would be, prudence dictates that we apply the same engi- neering conservatism that saved the Golden Gate Bridge from collapsing on its 50th anniversary and assume that preventing World War III is a necessity—not an option. Critical terror studies are garbage Jones and Smith, 9 - * University of Queensland, Queensland, Australia AND ** King's College, University of London, London, UK (David and M.L.R.,“We're All Terrorists Now: Critical—or Hypocritical—Studies “on” Terrorism?,” Studies in Conflict & Terrorism, Volume 32, Issue 4 April 2009 , pages 292 – 302, Taylor and Francis) The journal, in other words, is not intended, as one might assume, to evaluate critically those state or non-state actors that might have recourse to terrorism as a strategy. the journal's ambition is to deconstruct what it views as the ambiguity of the word “terror,” its manipulation by ostensibly liberal democratic state actors, and the complicity of “orthodox” terrorism studies in this authoritarian enterprise. Exposing the deficiencies in any field of study is, of course, a legitimate scholarly Instead, exercise, but what the symposium introducing the new volume announces questions both the research agenda and academic integrity of journals like Studies in Conflict and Terrorism and those who contribute to them. Do these claims, one might wonder, have any substance? Jackson, suggested Significantly, the original proposal circulated by the publisher Routledge and one of the editors, Richard some uncertainty concerning the preferred title of the journal. Critical Studies on Terrorism appeared last on a list where the first choice was Review of Terror Studies. Evidently, the concision of a review fails to capture the critical perspective the journal promotes. Criticism, then, is central to the new journal's philosophy and the adjective connotes a distinct ideological and, as shall be seen, far from pluralist and inclusive purpose. So, one might ask, what exactly does a critical approach to terrorism involve? What it Means to be Critical The editors and contributors explore what it means to be “critical” in detail, repetition, and opacity, along with an excessive fondness for italics, in the editorial symposium that introduces the first issue, and in a number of subsequent articles. The editors inform us that the study of terrorism is “a growth industry,” observing with a mixture of envy and disapproval that “literally thousands of new books and articles on terrorism are published every year” (pp. l-2). In adding to this literature the editors premise the need for yet another journal on their resistance to what currently constitutes scholarship in the field of terrorism study and its allegedly uncritical acceptance of the Western democratic state's security perspective. Indeed, to be critical requires a radical reversal of what the journal assumes to be the typical perception of terrorism and the methodology of terrorism research. To focus on the , “acts of clandestine non-state terrorism are committed by a tiny number of individuals and result in between a few hundred and a few thousand casualties per year over the entire world” (original italics) (p. strategies practiced by non-state actors that feature under the conventional denotation “terror” is, for the critical theorist, misplaced. As the symposium explains 1). The United States's and its allies' preoccupation with terrorism is, therefore, out of proportion to its effects.1 At the same time, the more pervasive and repressive terror practiced by the state has been “silenced from public and … academic discourse” (p. 1). The complicity of terrorism studies with the increasingly authoritarian demands of Western, liberal state and media practice, together with the moral and political blindness of established terrorism analysts to this relationship forms the journal's overriding assumption and one that its core contributors repeat ad nauseam. Thus, Michael Stohl, in his contribution “Old Myths, New Fantasies and the Enduring Realities of Terrorism” (pp. 5-16), not only discovers ten “myths” informing the understanding of terrorism, but also finds that these myths reflect a “state centric security focus,” where analysts rarely consider “the violence perpetrated by the state” (p. 5). He complains that the press have become too close to government over the matter. Somewhat contradictorily Stohl subsequently asserts that media reporting is “central to terrorism and counter-terrorism as political action,” that media reportage provides the oxygen of terrorism, and that politicians consider journalists to be “the terrorist's best friend” (p. 7). Stohl further compounds this incoherence, claiming that “the media are far more likely to focus on the destructive actions, rather than on … grievances or the social conditions that breed [terrorism]—to present episodic rather than thematic stories” (p. 7). He argues that terror attacks between 1968 and 1980 were scarcely reported in the United States, and that reporters do not delve deeply into the sources of conflict (p. 8). All of this is quite contentious, with no direct evidence produced to support such statements. The “media” is after all a very broad term, and to assume that it is monolithic is to replace criticism with conspiracy theory. Moreover, even if it were true that the media always serves as a government propaganda agency, then by Stohl's own logic, terrorism as a method of political communication is clearly futile as no rational actor would engage in a campaign doomed to be endlessly misreported. the notion that an inherent pro-state bias vitiates terrorism studies pervades the critical position. Anthony Burke, in “The End of Terrorism Studies” (pp. 37-49), asserts that established analysts like Bruce Hoffman “specifically exclude states as possible Nevertheless, perpetrators” of terror. Consequently, the emergence of “critical terrorism studies” “may signal the end of a particular kind of traditionally state-focused and directed 'problemsolving' terrorism studies—at least in terms of its ability to assume that its categories and commitments are immune from challenge and correspond to a stable picture of reality” (p. 42). Elsewhere, Adrian Guelke, in “Great Whites, Paedophiles and Terrorists: The Need for Critical Thinking in a New Era of Terror” (pp. 17-25), considers British governmentinduced media “scare-mongering” to have legitimated an “authoritarian approach” to the purported new era of terror (pp. 22-23). Meanwhile, Joseba Zulaika and William A. Douglass, in “The Terrorist Subject: Terrorist Studies and the Absent Subjectivity” (pp. 27-36), find the War on Terror constitutes “the single,” all embracing paradigm of analysis where the critical voice is “not allowed to ask: what is the reality itself?” (original italics) (pp. 28-29). The construction of this condition, they further reveal, if somewhat abstrusely, reflects an abstract “desire” that demands terror as “an ever-present threat” (p. 31). In order to sustain this fabrication: “Terrorism experts and commentators” function as “realist policemen”; and not very smart ones at that, who while “gazing at the evidence” are “unable to read the paradoxical logic of the desire that fuels it, Booth, in “The Human Faces of Terror: Reflections in a Cracked Looking Glass” (pp. 65-79), reiterates Richard Jackson's contention that state terrorism “is a much more serious problem than non-state terrorism” (p. 76). Yet, one searches in vain in these articles for evidence to support the ubiquitous assertion of state bias: assuming this bias in conventional terrorism analysis as a fact seemingly does not require a corresponding concern with evidence of this fact, merely its continual reiteration by conceptual fiat. A critical perspective dispenses not only with terrorism studies but also with the norms of accepted scholarship. Asserting what needs to be demonstrated commits, of course, the elementary logical fallacy petitio principii. But critical theory apparently emancipates (to use its favorite verb) its practitioners from the confines of logic, reason, and the usual standards of academic inquiry. Alleging a constitutive weakness in established scholarship without the necessity of providing proof to support it, therefore, appears to define the critical posture. The unproved “state centricity” of terrorism studies serves as a platform for further unsubstantiated accusations about the state of the discipline. Jackson and his fellow editors, along with later claims by Zulaika and Douglass, and Booth, again assert that “orthodox” analysts rarely bother “to interview or engage with those involved in 'terrorist' activity” (p. 2) or spend any time “on the ground in the areas most affected by conflict” (p. 74). Given that Booth and Jackson whereby lack turns toexcess” (original italics) (p. 32). Finally, Ken spend most of their time on the ground in Aberystwyth, Ceredigion, not a notably terror rich environment if we discount the operations of Meibion Glyndwr who would as a matter of principle avoid pob sais like Jackson and Booth, this seems a bit like the pot calling the kettle black. It also overlooks the fact that Studies in Conflict and Terrorism first advertised the problem of “talking to terrorists” in 2001 and has gone to great lengths to rectify this lacuna, if it is one, regularly publishing articles by analysts with first-hand experience of groups like the Taliban, Al Qaeda and Jemaah Islamiyah. A consequence of avoiding primary research, it is further alleged, leads conventional analysts uncritically to apply psychological and problem-solving approaches to their object of study. This propensity, Booth maintains, occasions another unrecognized weakness in traditional terrorism research, namely, an inability to engage with “the particular dynamics of the political world” (p. 70). Analogously, Stohl claims that “the US and English [sic] media” exhibit a tendency to psychologize terrorist acts, which reduces “structural and political problems” into issues of individual pathology (p. 7). Preoccupied with this problem-solving, psychopathologizing methodology, terrorism analysts have lost the capacity to reflect on both their practice and their research ethics. By contrast, the critical approach is not only self-reflective, but also and, for good measure, self-reflexive. In fact, the editors and a number of the journal's contributors use these terms interchangeably, treating a reflection and a reflex as synonyms (p. 2). A cursory encounter with the Shorter Oxford Dictionary would reveal that they are not. Despite this linguistically challenged misidentification, “reflexivity” is made to do a lot of work in the critical idiom. Reflexivity, the editors inform us, requires a capacity “to challenge dominant knowledge and understandings, is sensitive to the politics of labelling … is transparent about its own values and political standpoints, adheres to a set of responsible research ethics, and is committed to a broadly defined notion of emancipation” (p. 2). This covers a range of not very obviously related but critically approved virtues. Let us examine what reflexivity involves as Stohl, Guelke, Zulaika and Douglass, Burke, and Booth explore, somewhat repetitively, its implications. Reflexive or Defective? to challenge dominant knowledge and understanding and retain sensitivity to labels leads inevitably to a fixation with language, discourse, the ambiguity of the noun, terror, and its political use and abuse. Terrorism, Booth enlightens the reader unremarkably, is “a politically loaded term” (p. 72). Meanwhile, Zulaika and Douglass Firstly, consider terror “the dominant tropic [sic] space in contemporary political and journalistic discourse” (p. 30). Faced with the “serious challenge” (Booth p. 72) and pejorative connotation that the noun conveys, critical terrorologists turn to deconstruction and bring the full force of postmodern obscurantism to bear on its use. Thus the editors proclaim that terrorism is “one of the most powerful signifiers in contemporary discourse.” There is, moreover, a “yawning gap between the 'terrorism' signifier and the actual acts signified” (p. 1). “[V]irtually all of this activity,” the editors pronounce ex cathedra, “refers to the response to acts of political violence not the violence itself” (original italics) (p. 1). Here again they offer no evidence for this curious assertion and assume, it would seem, all conventional terrorism studies address issues of homeland security. In keeping with this critical orthodoxy that he has done much to define, Anthony Burke also asserts the “instability (and thoroughly politicized nature) of the unifying masterterms of our field: 'terror' and 'terrorism'” (p. 38). To address this he contends that a critical stance requires us to “keep this radical instability and inherent politicization of the concept of terrorism at the forefront of its analysis.” Indeed, “without a conscious reflexivity about the most basic definition of the object, our discourse will not be critical at all” (p. 38). More particularly, drawing on a jargon-infused amalgam of Michel Foucault's identification of a relationship between power and knowledge, the neo-Marxist Frankfurt School's critique of democratic false consciousness, mixed with the existentialism of the Third Reich's favorite philosopher, Martin Heidegger, Burke “questions the question.” This intellectual potpourri apparently enables the critical theorist to “question the ontological status of a 'problem' before any attempt to map out, study or resolve it” (p. 38). Interestingly, Burke, Booth, and the symposistahood deny that there might be objective data about violence or that a properly focused strategic study of terrorism would not include any prescriptive goodness or rightness of action. While a strategic theorist or a skeptical social scientist might claim to consider only the complex relational situation that involves as well as the actions, the attitude of human beings to them, the critical theorist's radical questioning of language denies this possibility. The critical approach to language and its deconstruction of an otherwise useful, if imperfect, political vocabulary has been the source of much confusion and inconsequentiality in the practice of the social sciences. It dates from the relativist pall that French radical post structural philosophers like Gilles Deleuze and Felix Guattari, Foucault, and Jacques Derrida, cast over the social and historical sciences in order to demonstrate that social and political knowledge depended on and underpinned power This radical assault on the possibility of either neutral fact or value ultimately functions unfalsifiably, and as a substitute for philosophy, social science, and a real theory of language. relations that permeated the landscape of the social and reinforced the liberal democratic state. The problem with the critical approach is that, as the Australian philosopher John Anderson demonstrated, to achieve a genuine study one must either investigate the facts that are talked about or the fact that they are talked about in a certain way. More precisely, as J.L. Mackie explains, “if we concentrate on the uses of language we fall between these in so far as an account of the use of language spills over into ontology it is liable to be a confused mixture of what should be two distinct investigations: the study of the facts about which the language is used, and the study of the linguistic phenomena themselves. It is precisely, however, this confused mixture of fact and discourse that critical thinking seeks to impose on the study of terrorism and infuses the practice of critical theory more generally. From this confused seed no coherent method grows. two stools, and we are in danger of taking our discoveries about manners of speaking as answers to questions about what is there.”2 Indeed, What is To Be Done? Booth sees critical theory not only exposing the dubious links between power and knowledge in established terrorism studies, but also offering an ideological agenda that transforms the face of global politics. “[C]ritical knowledge,” Booth declares, “involves understandings of the social world This ontological confusion notwithstanding, Ken that attempt to stand outside prevailing structures, processes, ideologies and orthodoxies while recognizing that all conceptualizations within the ambit of sociality derive from particular social/historical conditions” (original italics) (p. 78). Helpfully, Booth, assuming the manner of an Old Testament prophet, provides his critical disciples with “big-picture navigation aids” (original italics) (p. 66) to achieve this higher knowledge. Booth promulgates fifteen commandments (as Clemenceau remarked of Woodrow Wilson's nineteen points, in a somewhat different context, “God Almighty only gave us ten”). When not stating the staggeringly obvious, the Ken Commandments are hopelessly Critical theorists thus should “avoid exceptionalizing the study of terrorism,” “recognize that states can be agents of terrorism,” and “keep the long term in sight.” Unexceptional advice to be sure and long recognized by more traditional students of terrorism. The critical student, if not fully conversant with critical doublethink, however, might find the fact that she or he lives within “Powerful theories” that are “constitutive of political, social, and economic life” (6th Commandment, p. 71), sits uneasily with Booth's concluding injunction to “stand outside” prevailing ideologies (p. 78). contradictory. 3 In his preferred imperative idiom, Booth further contends that terrorism is best studied in the context of an “academic international relations” whose role “is not only to interpret the world but to change it” (pp. 67-68). Significantly, academic—or more precisely, critical—international relations, holds no place for a realist appreciation of the status quo but approves instead a Marxist ideology of praxis. It is within this transformative praxis that critical theory situates terrorism and terrorists. The political goals of those non-state entities that choose to practice the tactics of terrorism invariably seek a similar transformative praxis and this leads “critical global theorizing” into a curiously confused empathy with the motives of those engaged in such acts, as well as a disturbing relativism. Thus, Booth again decrees that the gap between “those who hate terrorism and those who carry it out, those who seek to delegitimize the acts of terrorists and those who incite them, and those who abjure terror and those who glorify it—is not as great as is implied or asserted by orthodox terrorism experts, the discourse of governments, or the popular press” (p. 66). The gap “between us/them is a slippery slope, not an unbridgeable political and ethical chasm” (p. 66). So, while “terrorist actions are always—without exception—wrong, they nevertheless might be contingently excusable” (p. 66). From this ultimately relativist perspective gang raping a defenseless woman, an act of terror on any critical or uncritical scale of evaluation, is, it would seem, wrong but potentially excusable. On the basis of this worrying relativism a further Ken Commandment requires the abolition of the discourse of evil on the somewhat questionable grounds that evil releases agents from responsibility (pp. 74-75). This not only reveals a profound ignorance of theology, it also underestimates what Eric Voeglin identified as a central feature of the appeal of modern political religions from the Third Reich to Al Qaeda. As Voeglin observed in 1938, the Nazis represented an “attractive force.” To understand that force requires not the abolition of evil [so necessary to the relativist] but comprehending its attractiveness. Significantly, as Barry Cooper argues, “its attractiveness, [like that of al Qaeda] cannot fully be understood apart from its evilness.”4 The line of relativist inquiry that critical theorists like Booth evince toward terrorism leads in fact not to moral clarity but an inspissated moral confusion. This is paradoxical given that the editors make much in the journal's introductory symposium of their “responsible research ethics.” The paradox is resolved when one realizes that critical moralizing demands the “ethics of responsibility to the terrorist other.” For Ken Booth it involves, it appears, empathizing “with the ethic of responsibility” faced by those who, “in extremis” “have some explosives” (p. 76). Anthony Burke contends that a critically self-conscious normativism requires the analyst, not only to “critique” the “strategic languages” of the West, but also to “take in” the “side of the Other” or more particularly “engage” “with the highly developed forms of thinking” that provides groups like Al Qaeda “with legitimizing foundations and a world view of some profundity” (p. 44). This additionally demands a capacity not only to empathize with the “other,” but also to recognize that both Osama bin Laden in his Messages to the West and Sayyid Qutb in his Muslim Brotherhood manifesto Milestones not only offer “well observed” criticisms of Western decadence, but also “converges with elements of critical theory” (p. 45). This is not surprising given that both Islamist and critical theorists share an analogous contempt for Western democracy, the market, and the international order these structures inhabit and have done much to shape. Histrionically Speaking Critical theory, then, embraces relativism not only toward language but also toward social action. Relativism and the bizarre ethicism it engenders in its attempt to empathize with the terrorist other are, moreover, histrionic. As Leo Strauss classically inquired of this relativist tendency in the social sciences, “is such an understanding dependent upon our own commitment or independent of it?” Strauss explains, if it is independent, I am committed as an actor and I am uncommitted in another compartment of myself in my capacity as a social scientist. “In that latter capacity I am completely empty and therefore completely open to the perception and appreciation of all commitments or value systems.” I go through the process of empathetic understanding in order to reach clarity about my commitment for only a part of me is engaged in my empathetic understanding. This means, however, that “such understanding is not serious or genuine but histrionic.” 5 It is also profoundly dependent on Western liberalism. For it is only in an open society that questions the values it promotes that the issue of empathy with the non-Western other could arise. The critical theorist's explicit loathing of the openness that affords her histrionic posturing obscures this constituting fact. On the basis of this histrionic empathy with the “other,” critical theory concludes that democratic states “do not always abjure acts of terror whether to advance their foreign policy objectives … or to buttress order at home” (p. 73). Consequently, Ken Booth asserts: “If terror can be part of the menu of choice for the relatively strong, it is hardly surprising it becomes a weapon of the relatively weak” (p. 73). Zulaika and Douglass similarly assert that terrorism is “always” a weapon of the weak (p. 33). At the core of this critical, ethicist, relativism therefore lies a syllogism that holds all violence is terror: Western states use violence, therefore, Western states are terrorist. Further, the greater terrorist uses the greater violence: Western governments exercise the greater violence. Therefore, it is the liberal democracies rather than Al Qaeda that are the greater terrorists. In its desire to empathize with the transformative ends, if not the means of terrorism generally and Islamist terror in particular, critical theory reveals itself as a form of Marxist unmasking. Thus, for Booth “terror has multiple forms” (original italics) and the real terror is economic, the product it would seem of “global capitalism” (p. 75). Only the engagee intellectual academic finding in deconstructive criticism the philosophical weapons that reveal the illiberal neo-conservative purpose informing the conventional study of terrorism and the democratic state's prosecution of counterterrorism can identify the real terror lurking behind the “manipulation of the politics of fear” (p. 75). Moreover, the resolution of this condition of escalating violence requires not any strategic solution that creates security as the basis for development whether in London or Booth, Burke, and the editors contend that the only solution to “the world-historical crisis that is facing human society globally” (p. 76) is universal human “emancipation.” This, according to Burke, Kabul. Instead, is “the normative end” that critical theory pursues. Following Jurgen Habermas, the godfather of critical theory, terrorism is really a form of distorted communication. The solution to this problem of failed communication resides not only in the improvement of living conditions, and “the political taming of unbounded capitalism,” but also in “the telos of mutual understanding.” Only through this telos with its “strong normative bias towards non violence” (p. 43) can a universal condition of peace and justice transform the In other words, the only ethical solution to terrorism is conversation: sitting around an uncoerced table presided over by Kofi Annan, along with Ken Booth, Osama bin Laden, President Obama, and some European Union pacifist sandalista, a transcendental communicative reason will emerge to promulgate norms of transformative justice. As Burke enunciates, the panacea of un-coerced communication globe. would establish “a secularism that might create an enduring architecture of basic shared values” (p. 46). un-coerced norm projection is not concerned with the world as it is, but how it ought to be. This not only compounds the logical errors that permeate critical theory, it advances an ultimately utopian agenda under the guise of soi-disant cosmopolitanism where one somewhat vaguely recognizes the “human interconnection and mutual vulnerability to nature, the cosmos and each other” (p. 47) and no doubt bursts into spontaneous chanting of Kumbaya. In the end, In analogous visionary terms, Booth defines real security as emancipation in a way that denies any definitional rigor to either term. The struggle against terrorism is, then, a struggle for emancipation from the oppression of political violence everywhere. Consequently, in this Manichean struggle for global emancipation against the real terror of Booth further maintains that universities have a crucial role to play. This also is something of a concern for those who do not share the critical vision, as university international relations departments are not now, it would seem, in business to pursue dispassionate analysis but instead are to serve as cheerleaders for this critically inspired vision. Overall, the journal's fallacious commitment to emancipation undermines any ostensible claim to pluralism and diversity. Over determined by this transformative approach to world politics, it necessarily denies the possibility of a realist or prudential appreciation of politics and the promotion not of universal solutions but pragmatic ones that accept the best that may be achieved in the circumstances. Ultimately, to present the world how it ought to be rather than as it is conceals a deep intolerance notable in the contempt with which many of the contributors to the journal appear to hold Western politicians and the Western media. It is the exploitation of this oughtistic style of thinking that leads the critic into a Humpty Dumpty world where words mean exactly what the critical theorist “chooses them to mean— neither more nor less.” However, in order to justify their disciplinary niche they have to insist on the failure of established modes of terrorism study. Having identified a source of government grants and academic perquisites, critical studies Western democracy, 6 in fact does not deal with the notion of terrorism as such, but instead the manner in which the Western liberal democratic state has supposedly manipulated the use of violence by non-state actors in order to “other” minority communities and create a politics of fear. Critical Studies and Strategic Theory—A Missed Opportunity Of course, the doubtful contribution of critical theory by no means implies that all is well with what one might call conventional terrorism studies. The subject area has in the past produced superficial assessments that have done little to contribute to an informed understanding of conflict. This is a point readily conceded by John Horgan and Michael Boyle who put “A Case Against 'Critical Terrorism Studies'” (pp. 51-74). Although they do not seek to challenge the agenda, assumptions, and contradictions inherent in the critical approach, their contribution to the new journal distinguishes itself by actually having a well-organized and well-supported argument. The authors' willingness to critical self-reflection is already present in existing terrorism studies. It is ironic, in fact, that the most clearly reflective, original, and critical contribution in the first edition should come from established acknowledge deficiencies in some terrorism research shows that terrorism researchers who critique the critical position. Interestingly, the specter haunting both conventional and critical terrorism studies is that both assume that terrorism is an existential phenomenon, and thus has causes and solutions. Burke makes this explicit: “The inauguration of this journal,” he declares, “indeed suggests broad agreement that there is a phenomenon called terrorism” (p. 39). Yet this is not the only way of looking at terrorism. For a strategic theorist the notion of terrorism does not exist as an independent phenomenon. It is an abstract noun. More precisely, it is merely a tactic—the creation of fear for political ends—that can be employed by any social actor, be it state or non-state, in any context, without any necessary moral value being involved. strategic theory offers a far more “critical perspective on terrorism” than do the perspectives advanced in this journal. Guelke, for example, propounds a curiously orthodox standpoint when he asserts: “to describe an act as Ironically, then, one of terrorism, without the qualification of quotation marks to indicate the author's distance from such a judgement, is to condemn it as absolutely illegitimate” (p. 19). If you Terrorism is simply a method to achieve an end. Any moral judgment on the act is entirely separate. To fuse the two is a category mistake. In strategic theory, which Guelke ignores, terrorism are a strategic theorist this is an invalid claim. does not, ipso facto, denote “absolutely illegitimate violence.” Intriguingly, Stohl, Booth, and Burke also imply that a strategic understanding forms part of their critical viewpoint. Booth, for instance, argues in one of his commandments that terrorism should be seen as a conscious human choice. Few strategic theorists would disagree. Similarly, Burke feels that there does “appear to be a consensus” that terrorism is a “form of instrumental political violence” (p. 38). The problem for the contributors to this volume is that they cannot emancipate themselves from the very orthodox assumption that the word terrorism is pejorative. That may be the popular understanding of the term, but inherently terrorism conveys no necessary connotation of moral condemnation. “Is terrorism a form of warfare, insurgency, struggle, resistance, coercion, atrocity, or great political crime,” Burke asks rhetorically. But once more he All violence is instrumental. Grading it according to whether it is insurgency, resistance, or atrocity is irrelevant. Any strategic actor may practice forms of warfare. For this reason Burke's further claim that existing definitions of terrorism have “specifically excluded states as possible perpetrators and privilege them as targets,” is wholly inaccurate (p. 38). Strategic theory has never excluded misses the point. state-directed terrorism as an object of study, and neither for that matter, as Horgan and Boyle point out, have more conventional studies of terrorism. Yet, Burke offers—as a critical revelation—that “the strategic intent behind the US bombing of North Vietnam and Cambodia, Israel's bombing of Lebanon, or the sanctions against Iraq is also terrorist.” He continues: “My point is not to remind us that states practise terror, but to show how mainstream strategic doctrines are terrorist in these terms and undermine any prospect of achieving the normative consensus if such terrorism is to be reduced and eventually eliminated” (original italics) (p. 41). This is not merely confused, it displays remarkable nescience on the part of one engaged in teaching the next generation of graduates from the Australian Defence Force Academy. Strategic theory conventionally recognizes that actions on the part of state or non-state actors that aim to create fear (such as the allied aerial bombing of Germany in World War II or the nuclear deterrent posture of Mutually Assured Destruction) can be terroristic in nature.7 The problem for critical analysts like Burke is that they impute their own moral valuations to the term terror. Strategic theorists do not. Moreover, the statement that this undermines any prospect that terrorism can be eliminated is illogical: you can never eliminate an abstract noun. those interested in a truly “critical” approach to the subject should perhaps turn to strategic theory for some relief from the strictures that have traditionally governed the study of terrorism, not to self-proclaimed critical theorists who only replicate the flawed understandings of those whom they criticize. Horgan and Boyle conclude their thoughtful article by claiming that critical terrorism Consequently, studies has more in common with traditional terrorism research than critical theorists would possibly like to admit. These reviewers agree: they are two sides of the same coin. Conclusion In the looking glass world of critical terror studies the conventional analysis of terrorism is ontologically challenged, lacks self-reflexivity, and is policy oriented. By contrast, critical theory's ethicist, yet relativist, and deconstructive gaze reveals that we are all terrorists now and must empathize with those sub-state actors who have recourse to violence for whatever motive. Despite their intolerable othering by media and governments, terrorists are really no different from us. In fact, there is terror as the weapon of the weak and the far worse economic and coercive terror of the liberal state. Terrorists therefore deserve empathy and they must be discursively engaged. At the core of this understanding sits a radical pacifism and an idealism that requires not the status quo but communication and “human emancipation.” Until this radical post-national utopia arrives both force and the discourse of evil must be abandoned and instead therapy and uncoerced conversation must be practiced. In the popular ABC drama Boston Legal Judge Brown perennially referred to the vague, irrelevant, jargon-ridden statements of lawyers as “jibber jabber.” The Aberystwyth-based school of critical internationalist utopianism that increasingly dominates the study of international relations in Britain and Australia has refined a higher order incoherence that may be termed Aber jabber. The pages of the journal of Critical Studies on Terrorism are its natural home. 1AC – Solvency CONTENTION 2: SOLVENCY Failure to codify existing policy into law risks spreading executive targeted killings and indefinite detention---plan’s key Daskal 13 - Fellow and Adjunct Professor, Georgetown Center on National Security and the Law University of Penn L. Rev., THE GEOGRAPHY OF THE BATTLEFIELD: A FRAMEWORK FOR DETENTION AND TARGETING OUTSIDE THE "HOT" CONFLICT ZONE, April, 161 U. Pa. L. Rev. 1165, Lexis Fifth, and critically, while the United States might be confident that it will exercise its authorities responsibly, it cannot assure that other states will follow suit. What is to prevent Russia, for example, from asserting that [*1233] it is engaged in an armed conflict with Chechen rebels, and can, consistent with the law of war, kill or detain any person anywhere in the world which it deems to be a "functional member" of that rebel group? Or Turkey from doing so with respect to alleged "functional members" of Kurdish rebel groups? If such a theory ultimately resulted in the targeted killing or detaining without charge of an American citizen, the United States would have few principled grounds for objecting.¶ Capitalizing on the strategic benefits of restraint, the United States should codify into law what is already, in many key respects, national policy. As a first step, the President should sign an Executive order requiring that out-ofbattlefield target and capture operations be based on individualized threat assessments and subject to a least-harmful-means test, clearly articulating the standards and procedures that would apply. As a next step, Congress should mandate the creation of a review system, as described in detail in this Article. In doing so, the United States will set an important example, one that can become a building block upon which to develop an international consensus as to the rules that apply to detention and targeted killings outside the conflict zone. Declaration of the territorial limits of detention and targeted strikes triggers US restraint and solves safe havens Daskal 13 - Fellow and Adjunct Professor, Georgetown Center on National Security and the Law University of Penn L. Rev., THE GEOGRAPHY OF THE BATTLEFIELD: A FRAMEWORK FOR DETENTION AND TARGETING OUTSIDE THE "HOT" CONFLICT ZONE, April, 2013, 161 U. Pa. L. Rev. 1165, Lexis This Article suggests a more nuanced, albeit still imperfect, approach: If the fighting is sufficiently widespread throughout the state, then the zone of active hostilities extends to the state's borders. If, however, hostilities are concentrated only in certain regions within a state, then the zone will be geographically limited to those administrative areas or provinces in which there is actual fighting, a significant possibility of fighting, or preparation for fighting. This test is fact-intensive and will depend on both the conditions on the ground and preexisting state and administrative boundaries. It remains somewhat arbitrary, of course, to link the zone of hostilities to nation-state boundaries or administrative regions within a state when neither the state itself nor the region is a party to the conflict and when the non-state party lacks explicit ties to the state or region at issue. This proposed which the key triggering factors - sustained, not present. But such boundaries, even if overinclusive or artificial, provide the most accurate means available of identifying the zone of active hostilities, at least over the short term. Over the long term, it would be preferable for the belligerent state to declare particular areas to be within the zone of active hostilities, either through an official pronouncement by the state party to the conflict or via a resolution by the Security Council or a regional security body. A public declaration would provide explicit notice as to the existence and parameters of the zone of active hostilities, thereby reducing uncertainty as to which legal rules apply. Such declarations would allow for public debate and diplomatic pressure in the event of disagreement. Furthermore, the belligerent states could then define the zone with greater nuance, which would better [*1209] reflect the actual fighting than would preexisting state or administrative boundaries. n138 Some likely will object that such an official designation would recreate the same safe havens that this proposal seeks to avoid. But a critical difference exists between a framework inevitably will incorporate some areas into the zone of active hostilities in overt hostilities - are territorially restricted framework that effectively prohibits reliance on law-of-war tools outside of specific zones of active hostilities and a zone approach that merely imposes heightened procedural and substantive standards on the use of such tools. Under the zone approach, the non-state enemy is not free from attack or capture; rather, the belligerent state simply must take greater care to ensure that the target meets the enhanced criteria described in Section III.B. B. Setting the Standards Law-of-war detention and lethal targeting outside a zone of active hostilities should be limited, not categorically prohibited. It should be focused on those threats that are clearly tied to the zone of active hostilities and other significant and ongoing threats that cannot be adequately addressed through other means. Moreover, a heightened quantum of information and other procedural requirements should apply, given the possibility and current practice of ex ante deliberation and review. Pursuant to these guiding principles, this Section proposes the adoption of an individualized threat requirement, a least-harmful-means test, and meaningful procedural safeguards for lethal targeting and law-of-war detention that take place outside zones of active hostilities. Failure to codify limits sets precedent for strikes and the erosion of rule of law ---Congress key Maxwell 12 - Colonel and Judge Advocate, U.S. Army, 1st Quarter 2012, “TARGETED KILLING, THE LAW, AND TERRORISTS: FEELING SAFE?,” Joint Force Quarterly, p. 123-130, Mark David Maxwell. Once a state demonstrates membership in an organized armed group, the members can be presumed to be a continuous danger. Because this danger is worldwide, the state can now act in areas outside the traditional zones of conflict. It is the individual’s conduct over time—regardless of location— that gives him the status. Once the status attaches, the member of the organized armed group can be targeted. ¶ Enter Congress ¶ The weakness of this theory is that it is not codified in U.S. law; it is merely the extrapolation of international theorists and organizations. The only entity under the Constitution that can frame and settle Presidential power regarding the enforcement of international norms is Congress. As the check on executive power, Congress must amend the AUMF to give the executive a statutory roadmap that articulates when force is appropriate and under what circumstances the President can use targeted killing. This would be the needed endorsement from Congress, the other political branch of government, to clarify the U.S. position on its use of force regarding targeted killing. For example, it would spell out the limits of American lethality once an individual takes the status of being a member of an organized group. Additionally, statutory clarification will give other states a roadmap for the contours of what constitutes anticipatory self-defense and the proper conduct of the military under the law of war.¶ Congress should also require that the President brief it on the decision matrix of articulated guidelines before a targeted killing mission is ordered. As Kenneth Anderson notes, “[t]he point about briefings to Congress is partly to allow it to exercise its democratic role as the people’s representative.”74¶ The desire to feel safe is understandable. The consumers who buy SUVs are not buying them to be less safe. Likewise, the champions of targeted killings want the feeling of safety achieved by the elimination of those who would do the United States harm. But allowing the President to order targeted killing without congressional limits means the President can manipulate force in the name of national security without tethering it to the law advanced by international norms. The potential consequence of such unilateral executive action is that it gives other states, such as North Korea and Iran, the customary precedent to do the same. Targeted killing might be required in certain circumstances, but if the guidelines are debated and understood, the decision can be executed with the full faith of the people’s representative, Congress. When the decision is made without Congress, the result might make the United States feel safer, but the process eschews what gives a state its greatest safety: the rule of law. Declaring territorial limits to conflict zones solves executive overreach and safe havens Laurie Blank 10, Director, International Humanitarian Law Clinic, Emory University School of Law, GEORGIA JOURNAL OF INTERNATIONAL AND COMPARATIVE LAW, VOLUME 39 2010 NUMBER 1, “DEFINING THE BATTLEFIELD IN CONTEMPORARY CONFLICT AND COUNTERTERRORISM: UNDERSTANDING THE PARAMETERS OF THE ZONE OF COMBAT”, http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1677965 Notwithstanding the complicated nature of the conflict between the U.S. and al Qaeda and affiliated terrorist groups, and the resulting confusion in trying to define the space where that conflict is taking place, identifying the parameters of the zone of combat is a critical task. At the same time that many debate whether a state can even be engaged in an armed conflict with a terrorist group, a critically important question with ramifications for generations to come, the U.S. has declared that it indeed is in such an armed conflict and is operating accordingly. Analyzing how we can understand the parameters of the zone of combat and assessing relevant factors for doing so must become part of the debate and discussion surrounding the appropriate response to and belligerency and neutrality are not designed to address the complex spatial and temporal nature of terrorist attacks and states responses. Nor can human rights law or domestic criminal law, which are both legal regimes of general applicability, offer a useful means for defining where a state can conduct military operations against terrorist groups. LOAC, in contrast, provides a framework not only for when it applies, but where and for how long. By using this framework and analogizing relevant factors and considerations to the conflict with al Qaeda, we can identify factors that can help define the zone of combat.¶ First, some terrorist attacks and activities fall closer to the traditional conception of hostilities as understood within LOAC. Areas where these types of attacks occur naturally have a stronger link to a battlefield. In addition, when such attacks or activities occur regularly or over a defined time period, we can more clearly define the temporal parameters of the zone of combat as well.¶ Second, in declaring that it is “at war with terrorists,” a state may envision the whole world as a battlefield. But the state’s actual conduct in response to the threat posed offers a more accurate lens through which to view the battlefield. Areas where the state uses military force, particularly multiple facets of military power, on a regular or recurring basis, should fall within the zone of combat. In contrast, those areas where the state chooses diplomatic or law enforcement measures, or relies on such efforts by another state, do not demonstrate the characteristics of the battlefield. This same analysis holds true for the temporal parameters as well. Applying this type of analysis in a simplistic manner does indeed leave room for abuse by states that might overuse military power merely to try to squeeze otherwise nonbattlefield areas within the zone of combat. While this is certainly a consideration, government response is only one factor to take into account in assessing the parameters of the zone of combat and both the nature of the international community and the great expense, both human and material, of applying military might where not necessary will likely weigh against any such abuse.¶ The third factor—territory— manner of combating terrorism.¶ This Article demonstrates that traditional conceptions of requires the most creative application. Terrorist groups do not use or connect to territory in the same manner as either states or non-state actors seeking to gain power or independence. Conflicts against terrorist territory can be a contributing factor to a paradigm defining the zone of combat nonetheless. Looking at territory from a new angle, we can see that terrorists use certain areas for safe havens and training camps and identify certain areas as prime targets for repeated attacks. Those territorial areas must therefore have a stronger connection to the zone of combat than others, both geographically and temporally, because the way terrorists use particular areas will naturally change over time.¶ Besides these factors drawn from the law of armed conflict, we can look to judicial interpretations and policy considerations as well. Taken as a whole, these analytical tools form a first step in the critical task of identifying where and when a state can conduct operations within an armed conflict framework , a groups, as a result, do not follow the boundaries on¶ a map or the dictates of state sovereignty or international legal niceties. But necessary companion to the ongoing debate about whether a state can conduct operations within such a framework. Simulated national security law debates preserve agency and enhance decision-making---avoids cooption Laura K. Donohue 13, Associate Professor of Law, Georgetown Law, 4/11, “National Security Law Pedagogy and the Role of Simulations”, http://jnslp.com/wpcontent/uploads/2013/04/National-Security-Law-Pedagogy-and-the-Role-of-Simulations.pdf The concept of simulations as an aspect of higher education, or in the law school environment, is not new.164 Moot court, after all, is a form of simulation and one of the oldest teaching devices in the law. What is new, however, is the idea of designing a civilian national security course that takes advantage of the doctrinal and experiential components of law school education and integrates the experience through a multi-day simulation. In 2009, I taught the first module based on this design at Stanford Law, which I developed the following year into a full course at Georgetown Law. It has since gone through multiple iterations. The initial concept followed on the federal full-scale Top Official (“TopOff”) exercises, used to train government officials to respond to domestic crises.165 It adapted a Tabletop Exercise, designed with the help of exercise officials at DHS and FEMA, to the law school environment. The Tabletop used one storyline to push on specific legal questions, as students, assigned roles in the discussion, sat around a table and for six hours engaged with the material. The problem with the Tabletop Exercise was that it was too static, and the rigidity of the format left little room, or time, for student agency. Unlike the government’s TopOff exercises, which gave officials the opportunity to fully engage with the many different concerns that arise in the course of a national security crisis as well as the chance to deal with externalities, the Tabletop focused on specific legal issues, even as it controlled for external chaos. The opportunity to provide a more full experience for the students came with the creation of first a one-day, and then a multi-day simulation. The course design and simulation continues to evolve. It offers The central idea in structuring the NSL Sim 2.0 course was to bridge the gap between theory and practice by conveying doctrinal material and creating an alternative reality in which students would be forced to act upon legal concerns.167 The exercise itself is a form of problem-based learning, wherein students are given both agency and responsibility for the results. Towards this end, the structure must be at once bounded (directed and focused on certain areas of the law and legal education) and flexible (responsive to student input and decisionmaking ). Perhaps the most significant weakness in a model for achieving the pedagogical goals outlined above, in the process developing a rigorous training ground for the next generation of national security lawyers.166 A. Course Design the use of any constructed universe is the problem of authenticity. Efforts to replicate reality will inevitably fall short. There is simply too much uncertainty, randomness, and complexity in the real world. One way The scenarios with which students grapple and the structural design of the simulation must reflect the national security realm, even as students themselves must make choices that carry consequences. Indeed, to some extent, student decisions themselves must drive the evolution of events within the simulation.168 Additionally, while authenticity matters, it is worth noting that at some level the fact that the incident does not take place in a real-world setting can be a great advantage. That is, the simulation creates an environment where students can make mistakes and learn from these mistakes – without what might otherwise be devastating consequences. It also allows instructors to develop multiple points of feedback to enrich student learning in to address this shortcoming, however, is through design and agency. a way that would be much more difficult to do in a regular practice setting. NSL Sim 2.0 takes as its starting point the national security pedagogical goals discussed above. It works backwards to then engineer a classroom, cyber, and physical/simulation experience to delve into each of these areas. As a substantive matter, the course focuses on the constitutional, statutory, and regulatory authorities in national security law, placing particular focus on the interstices between black letter law and areas where the field is either unsettled or in flux. A key aspect of the course design is that it retains both the doctrinal and experiential components of legal education. Divorcing simulations from the doctrinal environment risks falling short on the first and third national security pedagogical goals: (1) analytical skills and substantive knowledge, and (3) critical thought. A certain amount of both can be learned in the course of a simulation; however, the national security crisis environment is not well-suited to the more thoughtful and careful analytical discussion. What I am thus proposing is a course design in which doctrine is paired with the type of experiential learning more common in a clinical realm. The former precedes the latter, giving students the opportunity to develop depth and breadth prior to the exercise. In order to capture problems related to adaptation and evolution, addressing goal [1(d)], the simulation itself takes place over a multi-day period. Because of the intensity involved in national security matters (and conflicting demands on student time), the model makes use of a multi-user virtual environment. The use of such technology is critical to creating more powerful, immersive simulations.169 It also allows for continual interaction between the players. Multi-user virtual environments have the further advantage of helping to transform the traditional teaching culture, predominantly concerned with manipulating textual and symbolic knowledge, into a culture where students learn and can then be assessed on the basis of their participation in changing practices.170 I thus worked with the Information Technology group at Georgetown Law to build the cyber portal used for NSL Sim 2.0. The twin goals of adaptation and evolution require that students be given a significant amount of agency and responsibility for decisions taken in the course of the simulation. To further this aim, I constituted a Control Team, with six professors, four attorneys from practice, a media expert, six to eight former simulation students, and a number of technology experts. Four of the professors specialize in different areas of national security law and assume roles in the course of the exercise, with the aim of pushing students towards a deeper doctrinal understanding of shifting national security law authorities. One professor plays the role of President of the United States. The sixth professor focuses on questions of professional responsibility. The attorneys from practice help to build the simulation and then, along with all the professors, assume active roles during the simulation itself. Returning students assist in the execution of the play, further developing their understanding of national security law. Throughout the simulation, the Control Team is constantly reacting to student choices. When unexpected decisions are made, professors may choose to pursue the evolution of the story to accomplish the pedagogical aims, or they may choose to cut off play in that area (there are various devices for doing so, such as denying requests, immersion simulation involves a number scenarios, as well as systemic noise, to give students experience in dealing with the second pedagogical goal: factual chaos and information overload. The driving aim here is to teach students how to manage information more effectively. Five to six storylines are thus developed, each with its own arc and evolution. To this are added multiple alterations of the situation, relating to background noise. Thus, unlike hypotheticals, doctrinal problems, single-experience exercises, or even Tabletop exercises, the goal is not to eliminate external conditions, but to embrace them as part of the challenge facing national security lawyers. The simulation itself is problem-based, giving players agency in driving the evolution of the experience – thus sending materials to labs to be analyzed, drawing the players back into the main storylines, and leaking information to the media). A total of addressing goal [2(c)]. This requires a realtime response from the professor(s) overseeing the simulation, pairing bounded storylines with flexibility to emphasize different areas of the law and the students’ practical skills. Indeed, each storyline is based on a problem facing the government, to which players must then respond, generating in turn a set of new issues that must be addressed. The written and oral components of the simulation conform to the fourth pedagogical goal – the types of situations in which national security lawyers will find themselves. Particular emphasis is placed on nontraditional modes of communication, such as legal documents in advance of the crisis itself, meetings in the midst of breaking national security concerns, multiple informal interactions, media exchanges, telephone calls, Congressional testimony, and formal briefings to senior level officials in the course of the simulation as well as during the last class session. These oral components are paired with the preparation of formal legal instruments, such as applications to the Foreign Intelligence Surveillance Court, legal memos, applications for search warrants under Title III, and administrative subpoenas for NSLs. In addition, students are required to prepare a paper outlining their legal authorities prior to the simulation – and to deliver a 90 second oral briefing after the session. To replicate the high-stakes political environment at issue in goals (1) and (5), students are divided into political and legal roles and assigned to different (and competing) institutions: the White House, DoD, DHS, HHS, DOJ, DOS, Congress, state offices, nongovernmental organizations, and the media. This requires students to acknowledge and work within the broader Washington context, even as they are cognizant of the policy implications of their decisions. They must get used to Scenarios are selected with high consequence events in mind, to ensure that students recognize both the domestic and international dimensions of national security law. Further alterations to the simulation provide for the broader political context – for instance, whether it is an election year, which parties control different branches, and state and local issues in related but distinct areas. The media is given a particularly prominent role. One member of the Control Team runs an AP wire service, while two student working with policymakers and to representing one of many different considerations that decisionmakers take into account in the national security domain. players represent print and broadcast media, respectively. The Virtual News Network (“VNN”), which performs in the second capacity, runs continuously during the exercise, in the course of which players may at times be required to appear before the camera. This media component helps to emphasize the broader political context within which national security law is practiced. Both anticipated and unanticipated decisions give rise to ethical questions and matters related to the fifth goal: professional responsibility. The way in which such issues arise stems from simulation design as well as spontaneous interjections from both the Control Team and the participants in the simulation itself. As aforementioned, professors on the Control Team, and practicing attorneys who have previously gone through a simulation, focus on raising decision points that encourage students to consider ethical and professional considerations. Throughout the simulation good judgment and leadership play a key role, determining the players’ effectiveness, with the exercise itself hitting the aim of the integration of the various pedagogical goals. Finally, there are multiple layers of feedback that players receive prior to, during, and following the simulation to help them to gauge their effectiveness. The Socratic method in the course of doctrinal studies provides immediate assessment of the students’ grasp of the law. Written assignments focused on the contours of individual players’ authorities give professors an opportunity to assess students’ level of understanding prior to the simulation. And the simulation itself provides real-time feedback from both peers and professors. The Control Team provides data points for player reflection – for instance, the Control Team member playing President may make decisions based on player input, giving students an immediate impression of their level of persuasiveness, while another Control Team member may reject a FISC application as insufficient. The simulation goes beyond this, however, focusing on teaching students how to develop (6) opportunities for learning in the future. Student meetings with mentors in the field, which take place before the simulation, allow students to work out the institutional and political relationships and the manner in which law operates in practice, even as they learn how to develop mentoring relationships. (Prior to these meetings we have a class discussion about mentoring, professionalism, and feedback). Students, assigned to simulation teams about one quarter of the way through the course, receive peer feedback in the lead-up to the simulation and during the exercise itself. Following the simulation the Control Team and observers provide comments. Judges, who are senior members of the bar in the field of national security law, observe player interactions and provide additional debriefing. The simulation, moreover, is recorded through both the cyber portal and through VNN, allowing students to go back to assess their performance. Individual meetings with the professors teaching the course similarly follow the event. Finally, students end the course with a paper reflecting on their performance and the issues that arose in the course of the simulation, develop frameworks for As a substantive matter, NSL Sim 2.0 is designed to focuses on specific authorities that may be brought to bear in the course of a crisis. The decision of which areas to explore is made well in advance of the course . It is particularly helpful here to think about national security analyzing uncertainty, tension with colleagues, mistakes, and successes in the future. B. Substantive Areas: Interstices and Threats take account of areas of the law central to national security. It authorities on a continuum, as a way to impress upon students that there are shifting standards depending upon the type of threat faced. One course, for instance, might center on the interstices between crime, This is the most important determination, because the substance of the doctrinal portion of the course and the simulation follows from this decision. For a course focused on the interstices between pandemic disease and biological weapons, for instance, preliminary inquiry would lay out which authorities apply, where the courts have weighed drugs, terrorism and war. Another might address the intersection of pandemic disease and biological weapons. A third could examine cybercrime and cyberterrorism. in on the question, and what matters are unsettled. Relevant areas might include public health law, biological weapons provisions, federal quarantine and isolation authorities, habeas corpus and due process, military enforcement and posse comitatus, eminent domain and appropriation of land/property, takings, contact tracing, thermal imaging and surveillance, electronic tagging, vaccination, and intelligence- This, then, becomes a guide for the doctrinal part of the course, as well as the grounds on which the specific scenarios developed for the simulation are based. The authorities, simultaneously, are included in an electronic resource library and embedded in the cyber portal (the Digital Archives) to act as a closed universe of gathering. The critical areas can then be divided according to the dominant constitutional authority, statutory authorities, regulations, key cases, general rules, and constitutional questions. the legal authorities needed by the students in the course of the simulation. Professional responsibility in the national security realm and the institutional relationships of those tasked with responding to biological weapons and pandemic disease also come within the doctrinal part of the course. The simulation itself is based on five to six storylines reflecting the interstices between different areas of the law. The storylines are used to present a coherent, non-linear scenario that can adapt to student responses. Each scenario is mapped out in a three to seven page document, which is then checked with scientists, government officials, and area experts for consistency with how the scenario would likely unfold in real life. For the biological weapons and pandemic disease emphasis, for example, one narrative might relate to the presentation of a patient suspected of carrying yersinia pestis at a hospital in the United States. The document would map out a daily progression of the disease consistent with epidemiological patterns and the central actors in the story: perhaps a U.S. citizen, potential connections to an international terrorist organization, intelligence on the individual’s actions overseas, etc. The scenario would be designed specifically to stress the intersection of public health and counterterrorism/biological weapons threats, and the associated (shifting) authorities, thus requiring the disease initially to look like an innocent presentation (for example, by someone who has traveled from overseas), but then for the storyline to move into the second realm (awareness that this was in fact a concerted attack). A second storyline might relate to a different disease outbreak in another part of the country, with the aim of introducing the Stafford Act/Insurrection Act line and raising federalism concerns. The role of the military here and Title 10/Title 32 questions would similarly arise – with the storyline designed to raise these questions. A third storyline might simply be well developed noise in the system: reports of suspicious activity potentially linked to radioactive material, with the actors linked to nuclear material. A fourth storyline would focus perhaps on container security concerns overseas, progressing through newspaper reports, about containers showing up in local police precincts. State politics would constitute the fifth storyline, raising question of the political pressures on the state officials in the exercise. Here, ethnic concerns, student issues, economic conditions, and community policing concerns might become the focus. The sixth storyline could be further noise in the system – loosely based on current events at the time. In addition to the storylines, a certain amount of noise is injected into the system through press releases, weather updates, private communications, and the like. The five to six storylines, prepared by the Control Team in consultation with experts, become the basis for the preparation of scenario “injects:” i.e., newspaper articles, VNN broadcasts, reports from NGOs, private communications between officials, classified information, government leaks, etc., which, when put together, constitute a linear progression. These are all written and/or filmed prior to the exercise. The progression is then mapped in an hourly chart for the unfolding events over a multi-day period. All six scenarios are placed on the same chart, in six columns, giving the Control Team a birds-eye view of the progression. C. How It Works As for the nuts and bolts of the simulation itself, it traditionally begins outside of class, in the evening, on the grounds that national security crises often occur at inconvenient times and may well involve limited sleep and competing demands.171 Typically, a phone call from a Control Team member posing in a role integral to one of the main storylines, initiates play. Students at this point have been assigned dedicated simulation email addresses and provided access to the cyber portal. The portal itself gives each team the opportunity to converse in a “classified” domain with other team members, as well as access to a public AP wire and broadcast channel, carrying the latest news and on which press releases or (for the media roles) news stories can be posted. The complete universe of legal authorities required for the simulation is located on the cyber portal in the Digital Archives, as are forms required for some of the legal instruments (saving students the time of developing these from scratch in the course of play). Additional “classified” material – both general and SCI – has been provided to the relevant student teams. The Control Team has access to the complete site. For the next two (or three) days, outside of student initiatives (which, at their prompting, may include face-to-face meetings between the players), the entire simulation takes place through the cyber portal. The Control Team, immediately active, begins responding to player decisions as they become public (and occasionally, through monitoring the “classified” communications, before they are released). This time period provides a ramp-up to the third (or fourth) day of play, allowing for the adjustment of any substantive, student, or technology concerns, while setting the stage for the breaking crisis. The third (or fourth) day of play takes place entirely at Georgetown Law. A special room is constructed for meetings between the President and principals, in the form of either the National Security Council or the Homeland Security Council, with breakout rooms assigned to each of the agencies involved in the NSC process. Congress is provided with its own physical space, in which meetings, committee hearings and legislative drafting can take place. State government officials are allotted their own area, separate from the federal domain, with the Media placed between the three major interests. The Control Team is sequestered in a different area, to which students are not admitted. At each of the major areas, the cyber portal is publicly displayed on large flat panel screens, allowing for the streaming of video updates from the media, AP wire injects, articles from the students assigned to represent leading newspapers, and press releases. Students use their own laptop computers for team decisions and communication. As the storylines unfold, the Control Team takes on a variety of roles, such as that of the President, Vice President, President’s chief of staff, governor of a state, public health officials, and foreign dignitaries. Some of the roles are adopted on the fly, depending upon player responses and queries as the storylines progress. Judges, given full access to each player domain, determine how effectively the students accomplish the national security goals. The judges are themselves well-experienced in the practice of national security law, as well as in legal education. They thus can offer a unique perspective on the scenarios confronted by the students, the manner in which the simulation unfolded, and how the students performed in their various capacities. At the end of the day, the exercise terminates and an immediate hotwash is held, in which players are first debriefed on what occurred during the simulation. Because of the players’ divergent experiences and the different roles assigned to them, the students at this point are often unaware of the complete picture. The judges and formal observers then offer reflections on the simulation and determine which teams performed most effectively. Over the next few classes, more details about the simulation emerge, as students discuss it in more depth and consider limitations created by their knowledge or institutional position, questions that arose in regard to their grasp of the law, the types of decision-making processes that occurred, and the effectiveness of their – and other students’ – performances. Reflection papers, paired with oral briefings, focus on the substantive issues raised by the simulation and introduce the opportunity for students to reflect on how to create opportunities for learning in the future. The course then formally ends.172 Learning, however, continues beyond the temporal confines of the semester. Students who perform well and who would like to continue to participate in the simulations are invited back as members of the control team, giving them a chance to deepen their understanding of national security law. Following graduation, a few students who go in to the field are then invited to continue their affiliation as National Security Law fellows, becoming increasingly involved in the evolution of the exercise itself. This system of vertical integration helps to build a mentoring environment for the students while they are enrolled in law school and to create opportunities for learning and mentorship post- The legal academy has, of late, been swept up in concern about the economic conditions that affect the placement of law school graduates. The image being conveyed, however, does not resonate in every legal field. It is particularly inapposite to the burgeoning opportunities presented to students in national security. That the conversation about legal education is taking place now should come as little surprise. Quite apart from economic concern is the traditional introspection that follows American military engagement. It makes sense: law overlaps substantially with political power, being at once both the expression of government authority and the effort to limit the same . The one-size fits all approach currently dominating the conversation in legal education, however, appears ill-suited to address the concerns raised in the current conversation. Instead of looking at law across the board, greater insight can be gleaned by looking at the specific demands of the different fields themselves. This does not mean that the goals identified will be exclusive to, for instance, national security law, but it does suggest there will be greater nuance in the discussion of the adequacy of the current pedagogical approach. With this approach in mind, I have here graduation. It helps to keep the exercise current and reflective of emerging national security concerns. And it builds a strong community of individuals with common interests. CONCLUSION suggested six pedagogical goals for national security. For following graduation, students must be able to perform in each of the areas identified – (1) understanding the law as applied, (2) dealing with factual chaos and uncertainty, (3) obtaining critical distance, (4) developing nontraditional written and oral communication skills, (5) exhibiting leadership, integrity, and good judgment in a high-stakes, highly-charged environment, and (6) creating continued opportunities for self-learning. They also must learn how to integrate these different skills into one experience, to ensure that they will be most effective when they enter current structures in legal education is that they fall short, in important ways, from helping students to meet these goals. Doctrinal courses may incorporate a range of experiential learning components, such as the field. The problem with the hypotheticals, doctrinal problems, single exercises, extended or continuing exercises, and tabletop exercises. These are important classroom devices. The amount of time required for each varies, as does the object But where they fall short is in providing a more holistic approach to national security law which will allow for the maximum conveyance of required skills. Total immersion simulations, which have not yet been addressed in the secondary literature for civilian education in national security law, may provide an important way forward. Such simulations also cure shortcomings in other areas of experiential education, such as clinics and moot court. It is in an effort to address these concerns that I developed the simulation model above. NSL Sim 2.0 certainly is not the only solution, but it does provide a starting point for moving forward. The approach draws on the strengths of doctrinal courses and embeds a total immersion simulation within a course. It makes use of technology and physical space to engage students in a multi-day exercise, in which they are given agency and responsibility for their decision making, resulting in a steep learning curve. While further adaptation of this model is undoubtedly necessary, it suggests one potential direction for the years to come. of the exercise itself. Prefer specificity—simulation about war powers is uniquely empowering Laura K. Donohue 13, Associate Professor of Law, Georgetown Law, 4/11, National Security Law Pedagogy and the Role of Simulations, http://jnslp.com/wpcontent/uploads/2013/04/National-Security-Law-Pedagogy-and-the-Role-of-Simulations.pdf 2. Factual Chaos and Uncertainty¶ One of the most important skills for students going into national security law is the ability to deal with factual chaos. The presentation of factual chaos significantly differs from the traditional model of legal education, in which students are provided a set of facts which they must analyze. Lawyers working in national security law must figure out what information they need, integrate enormous amounts of data from numerous sources, determine which information is reliable and relevant, and proceed with analysis and recommendations. Their recommendations, moreover, must be based on contingent conditions: facts may be classified and unavailable to the legal analyst, or facts may change as new information emerges. This is as true for government lawyers as it is for those outside of governmental structures. They must be aware of what is known, what is unsure, what is unknown, and the possibility of changing circumstances, and they must advise their clients, from the beginning, how the legal analysis might shift if the factual basis alters. a. Chaos. Concern about information overload in the national security environment is not new: in the 1970s scholars discussed and debated how to handle the sequential phases of intelligence gathering and analysis in a manner that yielded an optimal result.132 But the digital revolution has exponentially transformed the quantitative terms of reference, the technical means of collection and analysis, and the volume of information available. The number of sources of information – not least in the online world – is staggering. Added to this is the rapid expansion in national security law itself: myriad new Executive Orders, Presidential Directives, institutions, programs, statutes, regulations, lawsuits, and judicial decisions mean that national security law itself is rapidly changing. Lawyers inside and outside of government must keep abreast of constantly evolving authorities. The international arena too is in flux, as global entities, such as the United Nations, the European Court of Human Rights, the G-7/G-8, and other countries, introduce new instruments whose reach includes U.S. interests. Rapid geopolitical changes relating to critical national security concerns, such as worldwide financial flows, the Middle East, the Arab Spring, South American drug cartels, North Korea, the former Soviet Union, China, and other issues require lawyers to keep up on what is happening globally as a way of understanding domestic concerns. Further expanding the information overload is the changing nature of what constitutes national security itself.133 In sum, the sheer amount of information the national security lawyer needs to assimilate is significant. The basic skills required in the 1970s thus may be similar – such as the ability (a) to know where to look for relevant and reliable information; (b) to obtain the necessary information in the most efficient manner possible; (c) to quickly discern reliable from unreliable information; (d) to know what data is critical; and (e) to ascertain what is as yet unknown or contingent on other conditions. But the volume of information, the diversity of information sources, and the heavy reliance on technology requires lawyers to develop new skills. They must be able to obtain the right information and to ignore chaos to focus on the critical issues. These features point in opposite directions – i.e., a broadening of knowledge and a narrowing of focus. A law school system built on the gradual and incremental advance of law, bolstered or defeated by judicial decisions and solidified through the adhesive nature of stare decisis appears particularly inapposite for this rapidly-changing environment. An important question that will thus confront students upon leaving the legal academy is how to keep abreast of rapidly changing national security and geopolitical concerns in an information-rich world in a manner that allows for capture of relevant information, while retaining the ability to focus on the immediate task at hand. Staying ahead of the curve requires developing a sense of timing – when to respond to important legal and factual shifts – and identifying the best means of doing so. Again, this applies to government and non-government employees. How should students prioritize certain information and then act upon it? This, too, is an aspect of information overload. b. Uncertainty. National security law proves an information-rich, factuallydriven environment. The ability to deal with such chaos may be hampered by gaps in the information available and the difficulty of engaging in complex fact-finding – a skill often under-taught in law school. Investigation of relevant information may need to reach far afield in order to generate careful legal analysis. Uncertainty here plays a key role. In determining, for instance, the contours of quarantine authority, lawyers may need to understand how the pandemic in question works, where there have been outbreaks, how it will spread, what treatments are available, which social distancing measures may prove most effective, what steps are being taken locally, at a state-level, and internationally, and the like. Lawyers in non-profit organizations, legal academics, inhouse attorneys, and others, in turn, working in the field, must learn how to find out the relevant information before commenting on new programs and initiatives, agreeing to contractual terms, or advising clients on the best course of action. For both government and non-government lawyers, the secrecy inherent in the field is of great consequence. The key here is learning to ask intelligent questions to generate the best legal analysis possible. It may be the case that national security lawyers are not aware of the facts they are missing – facts that would be central to legal analysis. This phenomenon front-loads the type of advice and discussions in which national security lawyers must engage. It means that analysis must be given in a transparent manner, contingent on a set of facts currently known, with indication given up front as to how that analysis might change, should the factual basis shift. This is particularly true of government attorneys, who may be advising policymakers who may or may not have a background in the law and who may have access to more information than the attorney. Signaling the key facts on which the legal decision rests with the caveat that the legal analysis of the situation might change if the facts change, provides for more robust consideration of critically important issues. c. Creative Problem Solving. Part of dealing with factual uncertainty in a rapidly changing environment is learning how to construct new ways to address emerging issues. Admittedly, much has been made in the academy about the importance of problem-based learning as a method in developing students’ critical thinking skills. 134 Problem-solving, however, is not merely a method of teaching. It is itself a goal for the type of activities in which lawyers will be engaged. The means-ends distinction is an important one to make here. Problemsolving in a classroom environment may be merely a conduit for learning a specific area of the law or a limited set of skills. But problem-solving as an end suggests the accumulation of a broader set of tools, such as familiarity with multidisciplinary approaches, creativity and originality, sequencing, collaboration, identification of contributors’ expertise, and how to leverage each skill set. This goal presents itself in the context of fact-finding, but it draws equally on strong understanding of legal authorities and practices, the Washington context, and policy considerations. Similarly, like the factors highlighted in the first pedagogical goal, adding to the tensions inherent in factual analysis is the abbreviated timeline in which national security attorneys must operate. Time may not be a commodity in surplus. This means that national security legal education must not only develop students’ complex fact-finding skills and their ability to provide contingent analysis, but it must teach them how to swiftly and efficiently engage in these activities. 3. Critical Distance As was recognized more than a century ago, analytical skills by themselves are insufficient training for individuals moving into the legal profession.135 Critical thinking provides the necessary distance from the law that is required in order to move the legal system forward. Critical thought, influenced by the Ancient Greek tradition, finds itself bound up in the Socratic method of dialogue that continues to define the legal academy. But it goes beyond such constructs as well. Scholars and educators disagree, of course, on what exactly critical thinking entails.136 For purposes of our present discussion, I understand it as the metaconversation in the law. Whereas legal analysis and substantive knowledge focus on the law as it is and how to work within the existing structures, critical thought provides distance and allows students to engage in purposeful discussion of theoretical constructs that deepen our understanding of both the actual and potential constructs of law. It is inherently reflective. For the purpose of practicing national security law, critical thought is paramount. This is true partly because of the unique conditions that tend to accompany the introduction of national security provisions: these are often introduced in the midst of an emergency. Their creation of new powers frequently has significant implications for distribution of authority at a federal level, a diminished role for state and local government in the federalism realm, and a direct impact on individual rights.137 Constitutional implications demand careful scrutiny. Yet at the time of an attack, enormous pressure is on officials and legislators to act and to be seen to act to respond.138 With the impact on rights, in particular, foremost in legislators’ minds, the first recourse often is to make any new powers temporary. However, they rarely turn out to be so, instead becoming embedded in the legislative framework and providing a baseline on which further measures are built.139 In order to withdraw them, legislators must demonstrate either that the provisions are not effective or that no violence will ensue upon their withdrawal (either way, a demanding proof). Alternatively, legislators would have to acknowledge that some level of violence may be tolerated – a step no politician is willing to take. Any new powers, introduced in the heat of the moment, may become a permanent part of the statutory and regulatory regime. They may not operate the way in which they were intended. They may impact certain groups in a disparate manner. They may have unintended and detrimental consequences. Therefore, it is necessary for national security lawyers to be able to view such provisions, and related policy decisions, from a distance and to be able to think through them outside of the contemporary context. There are many other reasons such critical analysis matters that reflect in other areas of the law. The ability to recognize problems, articulate underlying assumptions and values, understand how language is being used, assess whether argument is logical, test conclusions, and determine and analyze pertinent information depends on critical thinking skills. Indeed, one could draw argue that it is the goal of higher education to build the capacity to engage in critical thought. Deeply humanistic theories underlie this approach. The ability to develop discerning judgment – the very meaning of the Greek term, ������� – provides the basis for advancing the human condition through reason and intellectual engagement. Critical thought as used in practicing national security law may seem somewhat antithetical to the general legal enterprise in certain particulars. For government lawyers and consultants, there may be times in which not providing legal advice, when asked for it, may be as important as providing it. That is, it may be important not to put certain options on the table, with legal justifications behind them. Questions whether to advise or not to advise are bound up in considerations of policy, professional responsibility, and ethics. They may also relate to questions as to who one’s client is in the world of national security law.140 It may be unclear whether and at what point one’s client is a supervisor, the legal (or political) head of an agency, a cross-agency organization, the White House, the Constitution, or the American public. Depending upon this determination, the national security lawyer may or may not want to provide legal advice to one of the potential clients. Alternatively, such a lawyer may want to call attention to certain analyses to other clients. Determining when and how to act in these circumstances requires critical distance. 4. Nontraditional Written and Oral Communication Skills Law schools have long focused on written and oral communication skills that are central to the practice of law. Brief writing, scholarly analysis, criminal complaints, contractual agreements, trial advocacy, and appellate arguments constitute standard fare. What is perhaps unique about the way communication skills are used in the national security world is the importance of non-traditional modes of legal communication such as concise (and precise) oral briefings, email exchanges, private and passing conversations, agenda setting, meeting changed circumstances, and communications built on swiftly evolving and uncertain information. For many of these types of communications speed may be of the essence – and unlike the significant amounts of time that accompany preparation of lengthy legal documents (and the painstaking preparation for oral argument that marks moot court preparations.) Much of the activity that goes on within the Executive Branch occurs within a hierarchical system, wherein those closest to the issues have exceedingly short amounts of time to deliver the key points to those with the authority to exercise government power. Unexpected events, shifting conditions on the ground, and deadlines require immediate input, without the opportunity for lengthy consideration of the different facets of the issue presented. This is a different type of activity from the preparation of an appellate brief, for instance, involving a fuller exposition of the issues involved. It is closer to a blend of Supreme Court oral argument and witness crossexamination – although national security lawyers often may not have the luxury of the months, indeed, years, that cases take to evolve to address the myriad legal questions involved. Facts on which the legal analysis rests, moreover, as discussed above, may not be known. This has substantive implications for written and oral communications. Tension between the level of legal analysis possible and the national security process itself may lead to a different norm than in other areas of the law. Chief Judge Baker explains, If lawyers insist on knowing all the facts all the time, before they are willing to render advice, or, if they insist on preparing a written legal opinion in response to every question, then national security process would become dysfunctional. The delay alone would cause the policymaker to avoid, and perhaps evade, legal review.141 Simultaneously, lawyers cannot function without some opportunity to look carefully at the questions presented and to consult authoritative sources. “The art of lawyering in such context,” Baker explains, “lies in spotting the issue, accurately identifying the timeline for decision, and applying a meaningful degree of formal or informal review in response.”142 The lawyer providing advice must resist the pressure of the moment and yet still be responsive to the demand for swift action. The resulting written and oral communications thus may be shaped in different ways. Unwilling to bind clients’ hands, particularly in light of rapidly-changing facts and conditions, the potential for nuance to be lost is considerable. The political and historical overlay of national security law here matters. In some circumstances, even where written advice is not formally required, it may be in the national security lawyer’s best interests to commit informal advice to paper in the form of an email, notation, or short memo. The process may serve to provide an external check on the pressures that have been internalized, by allowing the lawyer to separate from the material and read it. It may give the lawyer the opportunity to have someone subject it to scrutiny. Baker suggests that “on issues of importance, even where the law is clear, as well as situations where novel positions are taken, lawyers should record their informal advice in a formal manner so that they may be held accountable for what they say, and what they don’t say.”143 Written and oral communication may occur at highly irregular moments – yet it is at these moments (in the elevator, during an email exchange, at a meeting, in the course of a telephone call), that critical legal and constitutional decisions are made. This model departs from the formalized nature of legal writing and research. Yet it is important that students are prepared for these types of written and oral communication as an ends in and of themselves. 5. Leadership, Integrity and Good Judgment National security law often takes place in a high stakes environment. There is tremendous pressure on attorneys operating in the field – not least because of the coercive nature of the authorities in question. The classified environment also plays a key role: many of the decisions made will never be known publicly, nor will they be examined outside of a small group of individuals – much less in a court of law. In this context, leadership, integrity, and good judgment stand paramount. The types of powers at issue in national security law are among the most coercive authorities available to the government. Decisions may result in the death of one or many human beings, the abridgment of rights, and the bypassing of protections otherwise incorporated into the law . The amount of pressure under which this situation places attorneys is of a higher magnitude than many other areas of the law. Added to this pressure is the highly political nature of national security law and the necessity of understanding the broader Washington context, within which individual decision-making, power relations, and institutional authorities compete. Policy concerns similarly dominate the landscape. It is not enough for national security attorneys to claim that they simply deal in legal advice. Their analyses carry consequences for those exercising power, for those who are the targets of such power, and for the public at large. The function of leadership in this context may be more about process than substantive authority. It may be a willingness to act on critical thought and to accept the impact of legal analysis. It is closely bound to integrity and professional responsibility and the ability to retain good judgment in extraordinary circumstances. Equally critical in the national security realm is the classified nature of so much of what is done in national security law. All data, for instance, relating to the design, manufacture, or utilization of atomic weapons, the production of special nuclear material, or the use of nuclear material in the production of energy is classified from birth.144 NSI, the bread and butter of the practice of national security law, is similarly classified. U.S. law defines NSI as “information which pertains to the national defense and foreign relations (National Security) of the United States and is classified in accordance with an Executive Order.” Nine primary Executive Orders and two subsidiary orders have been issued in this realm.145 The sheer amount of information incorporated within the classification scheme is here relevant. While original classification authorities have steadily decreased since 1980, and the number of original classification decisions is beginning to fall, the numbers are still high: in fiscal year 2010, for instance, there were nearly 2,300 original classification authorities and almost 225,000 original classification decisions.146 The classification realm, moreover, in which national security lawyers are most active, is expanding. Derivative classification decisions – classification resulting from the incorporation, paraphrasing, restating, or generation of classified information in some new form – is increasing. In FY 2010, there were more than seventy-six million such decisions made.147 This number is triple what it was in FY 2008. Legal decisions and advice tend to be based on information already classified relating to programs, initiatives, facts, intelligence, and previously classified legal opinions. The key issue here is that with so much of the essential information, decisionmaking, and executive branch jurisprudence necessarily secret, lawyers are limited in their opportunity for outside appraisal and review. Even within the executive branch, stove-piping occurs. The use of secure compartmentalized information (SCI) further compounds this problem as only a limited number of individuals – much less lawyers – may be read into a program. This diminishes the opportunity to identify and correct errors or to engage in debate and discussion over the law. Once a legal opinion is drafted, the opportunity to expose it to other lawyers may be restricted. The effect may be felt for decades, as successive Administrations reference prior legal decisions within certain agencies. The Office of Legal Counsel, for instance, has an entire body of jurisprudence that has never been made public, which continues to inform the legal analysis provided to the President. Only a handful of people at OLC may be aware of the previous decisions. They are prevented by classification authorities from revealing these decisions. This results in a sort of generational secret jurisprudence. Questions related to professional responsibility thus place the national security lawyer in a difficult position: not only may opportunities to check factual data or to consult with other attorneys be limited, but the impact of legal advice rendered may be felt for years to come. The problem extends beyond the executive branch. There are limited opportunities, for instance, for external judicial review. Two elements are at work here: first, very few cases involving national security concerns make it into court. Much of what is happening is simply not known. Even when it is known, it may be impossible to demonstrate standing – a persistent problem with regard to challenging, for instance, surveillance programs. Second, courts have historically proved particularly reluctant to intervene in national security matters. Judicially-created devices such as political question doctrine and state secrets underscore the reluctance of the judiciary to second-guess the executive in this realm. The exercise of these doctrines is increasing in the post-9/11 environment. Consider state secrets. While much was made of some five to seven state secrets cases that came to court during the Bush administration, in more than 100 cases the executive branch formally invoked state secrets, which the courts accepted.148 Many times judges did not even bother to look at the evidence in question before blocking it and/or dismissing the suit. In numerous additional cases, the courts treated the claims as though state secrets had been asserted – even where the doctrine had not been formally invoked.149 In light of these pressures – the profound consequences of many national security decisions, the existence of stovepiping even within the executive branch, and limited opportunity for external review – the practice of national security law requires a particularly rigorous and committed adherence to ethical standards and professional responsibility. This is a unique world in which there are enormous pressures, with potentially few external consequences for not acting in accordance with high standards. It thus becomes particularly important, from a pedagogical perspective, to think through the types of situations that national security attorneys may face, and to address the types of questions related to professional responsibility that will confront them in the course of their careers. Good judgment and leadership similarly stand paramount. These skills, like many of those discussed, may also be relevant to other areas of the law; however, the way in which they become manifest in national security law may be different in important ways. Good judgment, for instance, may mean any number of things, depending upon the attorney’s position within the political hierarchy. Policymaking positions will be considerably different from the provision of legal advice to policymakers. Leadership, too, may mean something different in this field intimately tied to political circumstance. It may mean breaking ranks with the political hierarchy, visibly adopting unpopular public or private positions, or resigning when faced by unethical situations. It may mean creating new bureaucratic structures to more effectively respond to threats. It may mean holding off clients until the attorneys within one’s group have the opportunity to look at issues while still being sensitive to the political needs of the institution. Recourse in such situations may be political, either through public statements and use of the media, or by going to different branches of government for a solution. 6. Creating Opportunities for Learning In addition to the above skills, national security lawyers must be able to engage in continuous self-learning in order to improve their performance. They must be able to identify new and emerging legal and political authorities and processes, systems for handling factual chaos and uncertainty, mechanisms to ensure critical distance, evaluating written and oral performance, and analyzing leadership skills. Law schools do not traditionally focus on how to teach students to continue their learning beyond the walls of academia. Yet it is vital for their future success to give students the ability to create conditions of learning. Terrorism studies are epistemologically and methodologically valid---our authors are self-reflexive Michael J. Boyle '8, School of International Relations, University of St. Andrews, and John Horgan, International Center for the Study of Terrorism, Department of Psychology, Pennsylvania State University, April 2008, “A Case Against Critical Terrorism Studies,” Critical Studies On Terrorism, Vol. 1, No. 1, p. 51-64 Jackson (2007c) calls for the development of an explicitly CTS on the basis of what he argues preceded it, dubbed ‘Orthodox Terrorism Studies’. The latter, he suggests, is characterized by: (1) its poor methods and theories, (2) its state centricity, (3) its problemsolving orientation, and (4) its institutional and intellectual links to state security projects. Jackson argues that the major defining characteristic of CTS, on the other hand, should be ‘a skeptical attitude towards accepted terrorism “knowledge”’. An implicit presumption from this is that terrorism scholars have laboured for all of these years without being aware that their area of study has an implicit bias, as well as definitional and methodological problems. In fact, terrorism scholars are not only well aware of these problems, but also have provided their own searching critiques of the field at various points during the last few decades (e.g. Silke 1996, Crenshaw 1998, Gordon 1999, Horgan 2005, esp. ch. 2, ‘Understanding Terrorism’). Some of those scholars most associated with the critique of empiricism implied in ‘Orthodox Terrorism Studies’ have also engaged in deeply critical examinations of the nature of sources, methods, and data in the study of terrorism. For example, Jackson (2007a) regularly cites the handbook produced by Schmid and Jongman (1988) to support his claims that theoretical progress has been limited. But this fact was well recognized by the authors; indeed, in the introduction of the second edition they point out that they have not revised their chapter on theories of terrorism from the first edition, because the failure to address persistent conceptual and data problems has undermined progress in the field. The point of their handbook was to sharpen and make more comprehensive the result of research on terrorism, not to glide over its methodological and definitional failings (Schmid and Jongman 1988, p. xiv). Similarly, Silke’s (2004) volume on the state of the field of terrorism research performed a similar function, highlighting the shortcomings of the field, in particular the lack of rigorous primary data collection. A nonreflective community of scholars does not produce such scathing indictments of its own work. Evaluate the specific scenarios our evidence outlines---their critiques are too reductive Michael J. Boyle '8, School of International Relations, University of St. Andrews, and John Horgan, International Center for the Study of Terrorism, Department of Psychology, Pennsylvania State University, April 2008, “A Case Against Critical Terrorism Studies,” Critical Studies On Terrorism, Vol. 1, No. 1, p. 51-64 One of the tensions within CTS concerns the issue of ‘policy relevance’. At the most basic level, there are some sweeping generalizations made by CTS scholars, often with little evidence. For example, Jackson (2007c) describes ‘the core terrorism scholars’ (without explicitly saying who he is referring to) as ‘intimately connected – institutionally, financially, politically, and ideologically – with a state hegemonic project’ (p. 245). Without giving any details of who these ‘core’ scholars are, where they are, what they do, and exactly who funds them, his arguments are tantamount to conjecture at best. We do not deny that governments fund terrorism research and terrorism researchers, and that this can influence the direction (and even the findings) of the research. But we are suspicious of over-generalizations of this count on two grounds: (1) accepting government funding or information does not necessarily obviate one’s independent scholarly judgment in a particular project; and (2) having policy relevance is not always a sin. On the first point, we are in agreement with some CTS scholars. Gunning provides a sensitive analysis of this problem, and calls on CTS advocates to come to terms with how they can engage policy-makers without losing their critical distance. He recognizes that CTS can (and should) aim to be policy-relevant, but perhaps to a different audience, including non-governmental organizations (NGOs), civil society than just governments and security services. In other words, CTS aims to whisper into the ear of the prince, but it is just a different prince . Gunning (2007a) also argues that research should be assessed on its own merits, for ‘just because a piece of research comes from RAND does not invalidate it; conversely, a “critical” study is not inherently good’ (p. 240). We agree entirely with this. Not all sponsored or contract research is made to ‘toe a party line’, and much of the work coming out of official government agencies or affiliated government agencies has little agenda and can be analytically useful. The task of the scholar is to retain one’s sense of critical judgment and integrity, and we believe that there is no prima facie reason to assume that this cannot be done in sponsored research projects. What matters here are the details of the research – what is the purpose of the work, how will it be done, how might the work be used in policy – and for these questions the scholar must be self-critical and insistent on their intellectual autonomy. The scholar must also be mindful of the responsibility they bear for shaping a government’s response to the problem of terrorism. Nothing – not the source of the funding, purpose of the research or prior empirical or theoretical commitment – obviates the need of the scholar to consider his or her own conscience carefully when engaging in work with any external actor. But simply engaging with governments on discrete projects does not make one an ‘embedded expert’ nor does it imply sanction to their actions. But we also believe that the study of political violence lends itself to policy relevance and that those who seek to produce research that might help policy-makers reduce the rates of terrorist attack are committing no sin, provided that they retain their independent judgment and report their findings candidly and honestly. In the case of terrorism, we would go further to argue that being policy relevant is in some instances an entirely justifiable moral choice. For example, neither of us has any problem producing research with a morally defensible but policy relevant goal (for example, helping the British government to prevent suicide bombers from attacking the London Underground) and we do not believe that engaging in such work tarnishes one’s stature as an independent scholar. Implicit in the CTS literature is a deep suspicion about the state and those who engage with it. Such a suspicion may blind some CTS scholars to good work done by those associated with the state. But to assume that being ‘embedded’ in an institution linked to the ‘establishment’ consists of being captured by a state hegemonic project is too simple. We do not believe that scholars studying terrorism must all be policy-relevant, but equally we do not believe that being policy relevant should always be interpreted as writing a blank cheque for governments or as necessarily implicating the scholar in the behaviour of that government on issues unrelated to one’s work. Working for the US government, for instance, does not imply that the scholar sanctions or approves of the abuses at Abu Ghraib prison. The assumption that those who do not practice CTS are all ‘embedded’ with the ‘establishment’ and that this somehow gives the green light for states to engage in illegal activity is in our view unwarranted, to say the very least. AT: No Motivation Al Qaeda’s actions, statements, and internal documents prove they want nuclear weapons and mass casualty attacks---**if the US relents, it guarantees nuclear attacks Larry J. Arbuckle 8, Naval Postgraduate School, "The Deterrence of Nuclear Terrorism through an Attribution Capability", Thesis for master of science in defense analysis, approved by Professor Robert O'Connell, and Gordon McCormick, Chairman, Department of Defense Analysis, Naval Postgraduate School, June However, there is evidence that a small number of terrorist organizations in recent history, and at least one presently, have nuclear ambitions. These groups include Al Qaeda, Aum Shinrikyo, and Chechen separatists (Bunn, Wier, and Friedman; 2005). Of these, Al Qaeda appears to have made the most serious attempts to obtain or otherwise develop a nuclear weapon. Demonstrating these intentions, in 2001 Osama Bin Laden, Ayman al Zawahiri, and two other al Qaeda operatives met with two Pakistani scientists to discuss weapons of mass destruction development (Kokoshin, 2006). Additionally, Al Qaeda has made significant efforts to justify the use of mass violence to its supporters. Sulaiman Abu Ghaith, an al Qaeda spokesman has stated that al Qaeda, “has the right to kill 4 million Americans – 2 million of them children,” in retaliation for deaths that al Qaeda links to the U.S. and its support of Israel (as cited in Bunn, Wier, and Friedman; 2005). Indeed Bin Laden received a fatwa in May 2003 from an extreme Saudi cleric authorizing the use of weapons of mass destruction against U.S. civilians (Bunn, Wier, and Friedman; 2005). Further evidence of intent is the following figure taken from al Qaeda documents seized in Afghanistan. It depicts a workable design for a nuclear weapon. Additionally, the text accompanying the design sketch includes some fairly advanced weapons design parameters (Boettcher & Arnesen, 2002). Clearly maximizing the loss of life is key among al Qaeda’s goals. Thus their use of conventional means of attack presently appears to be a result of their current capabilities and not a function of their pure preference (Western Europe, 2005). AT: CTS Their criticism is based on a poorly researched caricature of terrorism studies, orthodox analysis includes a self-reflexive element that makes the permutation more likely to succeed than the alternative. Pure rejection of the Western social order won’t replace terrorism discourse and is likely to reinforce the totalitarian impulse of al Qaeda Schmid 9 - Chair in International Relations; the Director of the Centre for the Study of Terrorism and Political Violence at St. Andrews University(Alex, Perspectives on Terrorism, v.3, issue 4, Book Review of “Critical Terrorism Studies. A new research agenda. by Richard Jackson”, http://www.terrorismanalysts.com/pt/index.php?option=com_rokzine&view=article&id=96 The editors accuse, in their introduction “the orthodox field” of orthodox terrorism studies of functioning “ideologically in the service of existing power structures”, with their academic research. Furthermore, they claim that orthodox scholars are frequently being used “to legitimise coercive intervention in the global South….” (p.6). The present volume is edited by three authors associated with the Centre for the Study of Radicalisation and Contemporary Political Violence (CSRV) in the Department of International Politics in Aberystwyth (Wales, UK). They also happen to be editors of a new Routledge journal “Critical Studies on Terrorism’ . The “critical” refers principally but not exclusively to the “Frankfurt-via-Welsh School Critical Theory Perspective”. The twelve contributors are not all equally “critical” in aHabermasian sense. The programmatic introduction of the editors is followed by two solid chapters from Magnus Ranstorp (former Director of CSTPV, St. Andrews, and currently Director of the Centre for Asymmetric Threat Studies at the Swedish National Defence College) and Andrew Silke (formerly with the UK Home Office and now Field Leader for Criminology at the University of East London). They both rightfully criticize some of the past sins and present shortcomings of the field of Terrorism Studies. One of them approvingly quotes Marc Sageman who observed that “disagreements among experts are the driving force of the scientific enterprise”. Such disagreements, however, exist among “orthodox” scholars like Sageman and Hoffman or Pape and Abrams. In that sense, the claim by some critical theorists that the field of traditional Terrorism Studies is ossified without them, is simply is not true. One of the problems with many of the adherents of the “critical” school is that the focus is almost exclusively on the strawman they set up to shoot - ”orthodox” terrorism discourse rather than on the practitioners of terrorism. Richard Jackson claims that “…most of what is accepted as wellfounded ‘knowledge’ in terrorism studies is, in fact, highly debatable and unstable” (p.74), dismissing thereby almost four decades of scholarship as “based on a series of ‘virulent myths’, ‘half-truths’ and contested claims…biased towards Western state priorities” (p.80). For him “terrorism is…a social fact rather than a brute fact” and “…does not exist outside of the definitions and practices which seek to enclose it, including those of the terrorism studies field” (pp.75-76). He objects to prevailing “problem-solving theories of terrorism” in favour of an approach that questions “ the status quo and the dominant acts within it” (p.77). Another contributor, J.A. Sluka, argues, without offering any proof, that “terrorism is fundamentally a product of social inequality and state politics” (p. 139). Behind many of the critical theorists who blame mainstream terrorism research for taking ‘the world as it finds it’ there is an agenda for changing the status quo and overthrowing existing power structures. There is, in itself, nothing wrong with wanting a new and better world order. However, it is not going to be achieved by using an alternative discourse on terrorism and counter-terrorism. Toros and Gunning, contributors of another chapter, state that “the sine qua non of Critical Theory is emancipation” (p. 99) and M. McDonald als puts “emancipation as central to the study of terrorism” (p.121). However, there is not a single word on the non-emancipated position of women under Islam in general or among the Taliban and their friends from al-Qaeda in particular. One of the strength (some argue weakness) of Western thinking is its ability for self-criticism – something largely absent in the Muslim world. In that sense, this volume falls within a Western tradition. However, self-criticism should not come at the cost of not criticising adversaries by using the same yardstick. In this sense, this volume is strangely silent about the worldview of those terrorists who have no self-doubts and attack the Red Cross, the United Nations, NGOs and their fellow Muslims with equal lack of scruples. A number of authors in the volume appear to equate terrorism uncritically with political violence in general while in fact it is more usefully thought of as one of some twenty sub-categories of political violence - one characterized by deliberate attacks on civilians and non-combatants in order to intimidate, coerce or otherwise manipulate various audiences and parties to a conflict. Part of the volume advocates reinventing the wheel. J. Gunning, for instance, recommends to employ Social Movement Theory for the study of terrorism. However, that theory has been employed already explicitly or implicitly by a number of more orthodox scholars, e.g. Donatella della Porta. Many “critical” statements in the volume are unsupported by convincing evidence, e.g. when C. Sylvester and S. Parashar state “The September 11 attacks and the ongoing war on terror reinforce gender hierarchy and power in international relations” (p.190). Jackson claims that the key question for critical terrorism theory is “who is terrorism research for and how does terrorism knowledge support particular interests?” (p.224) It does not seem to occur to him that he could have studied this question by looking at the practitioners of terrorism and study al-Qaeda’s ideological writings and its training and recruiting manuals. If CTS is a call for “making a commitment to emancipatory praxis central to the research enterprise” (R. Jackson et al, p. 228), CTS academics should be the first on the barricades against jihadists who treat women not as equals and who would, if they get their way, eradicate freedom of thought and religion for all mankind. It is sad that some leading proponents of Critical Terrorism Studies appear to be in fact uncritical and blind on one eye. 2AC Allies AT: Zones Keep Expanding Limits on war prevent endless exceptions Anderson 9 – Prof. of Law @ American University & Research Fellow @ Hoover Kenneth Anderson, Professor of Law, Washington College of Law, American University, and Research Fellow, The Hoover Institution, Stanford University and Member of its Task Force on National Security and the Law, 5/11/2009, Targeted Killing in U.S. Counterterrorism Strategy and Law, http://www.brookings.edu/~/media/research/files/papers/2009/5/11%20counterterrorism%2 0anderson/0511_counterterrorism_anderson.pdf There is a fundamental strategic and moral rationale lying behind both the policy trend toward targeted killing and toward the use of robotic and stand-off platforms such as the Predator drone as the preferred means of effectuating it. The United States has found the limits of how extensively it can wage full-scale wars with its military; even if it wanted to take on more wars, it has logistical and political limits. In addition, the United States has discovered that fullon war is useful principally against regimes. Full-scale, large-scale warfare of the kind waged in Afghanistan and Iraq is useful primarily for bringing down a government that, for example, might harbor or support terrorists, or which might be believed to be willing to supply terrorists with materials for weapons of mass destruction. While this tool has a crucial strategic place in national counterterrorism policy, by its nature, its role is about states and state-like groups. Large-scale military operations are less useful directly against transnational terrorists, who are few in number, dispersed across populations and often borders, disinclined to fight direct battles, and more efficiently targeted through narrower means. The fundamental role of overt warfare in counterterrorism is to eliminate the regimes that provide safe haven to terrorist groups; terrorist groups themselves can be strategically understood as an extreme version of a guerrilla organization engaged in a strategy of logistical raiding—in which civilian morale and the resulting manipulation of political will is the logistical target. 23 Logistical raiders typically need a safe base to which to retreat, and full-scale war is most useful in eliminating such safe bases and convincing other regimes not to provide them. 24 But it is not usually an efficient way of going directly after the transnational terrorist groups themselves. 25 Limitations on exceptions prevent damage to the Rule of Law – routine targeting does Rosa Brooks 12, Law Professor at Georgetown University and a fellow at the New America Foundation, served as a counselor to the U.S. undersecretary of defense for policy from 2009 to 2011 and previously served as a senior adviser at the U.S. State Department, "The danger with drones", October 7, www.buffalonews.com/apps/pbcs.dll/article?aid=/20121007/opinion/121009497/1122 As far as I can tell, none of these questions is being discussed within the Obama administration in any structured or systematic way. Meanwhile, U.S. reliance on drone strikes continues to increase. And because so much about U.S. drone strikes is classified, it’s almost impossible for journalists, regional experts, human rights groups or the general public to weigh in with informed views.¶ There’s nothing preordained about how we use new technologies, but by lowering the perceived costs of using lethal force, drone technologies enable a particularly invidious sort of mission creep. When covert killings are the rare exception, they don’t pose a fundamental challenge to the legal, moral and political framework in which we live. But when covert killings become a routine and ubiquitous tool of U.S. foreign policy, everything is up for grabs. Courts will keep the exception narrow Emily Hartz 13, professor of law at the University of Southern Denmark, 2013, "From the American Civil War to the War on Terror Three Models of Emergency Law in the United States Supreme Court"link.springer.com/content/pdf/10.1007%2F978-3-642-32633-2.pdf While it can be argued that the extralegal model does play some role in the Prize Cases as well as in Hirabayashi and Korematsu, all three cases also illustrate that whenever the question of extralegal emergency powers has come up , the Court has struggled not to sanction the extralegal model as a general principle. Rather than admitting expansive executive powers, the Court has aimed to tie its decision closely to the particular facts at hand and avoided general embracements of broad executive war powers. 2AC Circumvention Congress solves circumvention---raises political costs Ilya Somin 11, Professor of Law at George Mason University School of Law, June 21 2011, “Obama, the OLC, and the Libya Intervention,” http://www.volokh.com/2011/06/21/obamathe-olc-and-the-libya-intervention/ But I am more skeptical than Balkin that illegal presidential action can be constrained through better consultation with legal experts within the executive branch. The fact is that the president can almost always find respectable lawyers within his administration who will tell him that any policy he really wants to undertake is constitutional. Despite the opposition of the OLC, Obama got the view he wanted from the White House Counsel and from State Department Legal Adviser Harold Koh. Bush, of course, got it from within the OLC itself, in the form of John Yoo’s “torture memo.” This isn’t just because administration lawyers want to tell their political masters what they want to hear. It also arises from the understandable fact that administrations tend to appoint people who share the president’s ideological agenda and approach to constitutional interpretation. By all accounts, John Yoo was and is a true believer in nearly unlimited wartime executive power. He wasn’t simply trying to please Bush or Dick Cheney.¶ Better and more thorough consultation with executive branch lawyers can prevent the president from undertaking actions that virtually all legal experts believe to be unconstitutional. But on the many disputed questions where there is no such consensus, the president will usually be able find administration lawyers who will tell him what he wants to hear. To his credit, Ackerman is aware of this possibility, and recommends a creative institutional fix in his recent book: a new quasi-independent tribunal for assessing constitutional issues within the executive branch. I am somewhat skeptical that his approach will work, and it may well require a constitutional amendment to enact. I may elaborate these points in a future post, if time permits.¶ Regardless, for the foreseeable future, the main constraints on unconstitutional presidential activity must come from outside the executive branch – that is, from Congress, the courts, and public opinion. These constraints are highly imperfect. But they do impose genuine costs on presidents who cross the line. Ackerman cites the Watergate scandal, Iran-Contra and the “torture memo” as examples of the sorts of abuses of executive power that need to be restricted. True enough. But it’s worth remembering that Nixon was forced to resign over Watergate, Reagan paid a high political price for Iran-Contra, and the torture memo was a public relations disaster for Bush, whose administration eventually ended up withdrawing it (thanks in large part to the efforts of Jack Goldsmith). On the other side of the ledger, Bill Clinton paid little price for waging an illegal war in Kosovo, though he avoided it in part by keeping that conflict short and limited. It remains to be seen whether President Obama will suffer any political damage over Libya. President believes he is constrained by statute Saikrishna Prakash 12, professor of law at the University of Virginia and Michael Ramsey, professor of law at San Diego, “The Goldilocks Executive” Feb, SSRN We accept that the President’s lawyers search for legal arguments to justify presidential action, that they find the President’s policy preferences legal more often than they do not, and that the President sometimes disregards their conclusions. But the close attention the Executive pays to legal constraints suggests that the President (who, after all, is in a good position to know) believes himself constrained by law. Perhaps Posner and Vermeule believe that the President is mistaken. But we think, to the contrary, it represents the President’s recognition of the various constraints we have listed, and his appreciation that attempting to operate outside the bounds of law would trigger censure from Congress, courts, and the public . AT: Barriers Their evidence is all just like “there are a lot of steps”---our authors considered all of them --- the risk is real Peter Beinart 8, associate professor of journalism and political science at CUNY, The Good Fight; Why Liberals – and only Liberals – Can Win the War on Terror and Make America Great Again, 106-7 For all these reasons, jihadists seem less intent on acquiring a finished nuclear weapon than on acquiring weapons- grade uranium and building the bomb themselves. In the early 1990s, Al Qaeda bought a 3- foot- long cylinder from a Sudanese military officer who said it contained South African highly enriched uranium. It turned out to be a hoax. Jihadists have reportedly made other failed attempts as well. Eventually, however, they could succeed. Moscow may adequately protect its nuclear weapons, but the National Academy of Sciences has warned that “ large inventories of SNM [fissile material] are stored at many sites that apparently lack inventory controls.” And the Russians reportedly experience one or two attempted thefts of that material a year—that they know of. ¶ If Al Qaeda obtained 50 kilograms of weapons-g rade uranium, the hardest part would be over. The simplest nuke to build is the kind the United States dropped on Hiroshima, a “gun- type,” in which a mass of highly enriched uranium is fired down a large gun barrel into a second uranium mass. Instructions for how to make one are widely available. Just how widely available became clear to an elderly nuclear physicist named Theodore Taylor in 2002, when he looked up “atomic bomb” in the World Book Encyclopedia in his upstate New York nursing home, and found much of the information you’d need. ¶ Even with directions, building a nuclear bomb would still be a monumental task. According to a New York Times Magazine article by Bill Keller, in 1986 five Los Alamos nuke builders wrote a paper called “Can Terrorists Build Nuclear Weapons?” They concluded that it would require people who understood “the physical, chemical and metallurgical proper-¶ 107¶ ties of the various materials to be used, as well as characteristics affecting their fabrication; neutronic properties; radiation effects, both nuclear and biological; technology concerning high explosives and/or chemical pro- pellants; some hydrodynamics; electrical circuitry.” That sounds daunting. Yet, at the end of the paper, the scientists answered their question: “Yes, they can.” ¶ Finally, once terrorists built a nuclear weapon, they’d still have to smuggle it into the United States. The best way might be to put it in a shipping container, on one of the many supertankers that bring oil into American ports every day. The containers are huge, more than big enough to fit a gun-t ype nuke, which could be as small as 6 feet in length and 6 inches in diameter. Highly enriched uranium emits much less radiation than plutonium, and inside a supertanker’s thick doublesteel hull it would be hard for sensors to detect. What’s more, a single ship can carry several thousand containers, most of which are never searched. On September 11, 2002, ABC News smuggled a 15- pound cylinder of depleted uranium in a cargo container past U.S. customs. On September 11, 2003, they performed the same exercise—and got the uranium past customs again. AT: Terror K – Derrida Even K-hack critics of security practices concede terrorism’s worse--threatens extinction Derrida 3 - Jacques Derrida, Directeur d’Etudes at the Ecole des Hautes Etudes en Sciences Sociales in Paris, and Professor of Philosophy, French and Comparative Literature at the University of California, Irvine, 2003, Philosophy in a Time of Terror, p. 98-99 Why is this threat signaled by the “end of the Cold War”? Why is it worse than the “Cold War” itself? Like the formation of Arab Muslim terrorist networks equipped and trained during the Cold War, this threat represents the residual consequence of both the Cold War and the passage beyond the Cold War. On the one hand, because of the now uncontrollable proliferation of nuclear capability it is difficult to measure the degrees and forms of this force, just as it is difficult to delimit the responsibility for this proliferation, a point we cannot pursue here. On the other hand, and here we touch upon what is worse than the Cold War, there can now no longer be a balance of terror , for there is no longer a duel or standoff between two powerful states (U.S.A., -USSR) involved in a game theory in which both states are capable of neutralizing the other’s nuclear power through a reciprocal and organized evaluation of the respective risks. From now on, the nuclear threat, the “total” threat, no longer comes from a state but from anonymous forces that are absolutely unforeseeable and incalculable. And since this absolute threat will have been secreted by the end of what is supposed to sustain world order, the very possibility of a world and of any world- -wide effort [mondialisation] (international law, a world market, a the Cold War and the “victory” of the U.S. camp, since it threatens universal language, and so on), what is thus put at risk by this terrifying autoimmunitary logic is nothing less than the existence of the world, of the worldwide itself. There is no longer any limit to this threat that at once looks for its antecedents or its resources in the long history of the Cold War and yet appears infinitely more dangerous, frightening, terrifying than the Cold War. And there are, in fact, countless signs that this threat is accelerating and confirming the end of this Cold War, hastening the at least apparent reconciliation of two equally frightened enemies. When Bush and his associates blame “the axis of evil,” we ought both to smile at and denounce the religious connotations, the childish stratagems, the rhetoric. And yet there is, in fact, and from every quarter, an absolute “evil” whose threat, whose shadow, is spreading. Absolute evil, absolute threat, because what is at stake is nothing less than the mondialisation or the worldwide movement of the world, life on earth and elsewhere, without remainder. obscurantist mystifications of this inflated Al Qaeda seeks to destroy the globe---and that turns value-to-life --- err on the side of an imperfect West Derrida 3 - Jacques Derrida, Directeur d’Etudes at the Ecole des Hautes Etudes en Sciences Sociales in Paris, and Professor of Philosophy, French and Comparative Literature at the University of California, Irvine, 2003, Philosophy in a Time of Terror, interviewed by Giovanni Borradori, p. 98-99 Borradori: Earlier you emphasized the essential role of international organizations and the need to cultivate a respect for international law. Do you think that the kind of terrorism linked to the al Qaeda organization and to bin Laden harbors international political ambitions?¶ Derrida: What appears to me unacceptable in the "strategy" (in terms of weapons, practices, ideology, rhetoric, discourse, and so on) of the "bin Laden effect" is not only the cruelty, the disregard for human life, the disrespect for law, for women, the use of what is worst in technocapitalist modernity for the purposes of religious fanaticism. No, it is, above all, the fact that such actions and such discourse open onto no future and, in my view, have no future. If we are to put any faith in the perfectibility of public space and of the world juridico-political scene, of the "world" itself, then there is, it seems to me, nothing good to be hoped for from that quarter. What is being proposed, at least implicitly, is that all capitalist and modern techno scientific forces be put in the service of an interpretation, itself dogmatic, of the Islamic revelation of the One. Nothing of what has been so laboriously secularized in the forms of the "political," of "democracy," of "international law," and even in the nontheological form of sovereignty (assuming, again, that the value of sovereignty can be completely secularized or detheologized, a hypothesis about which I have my doubts), none of this seems to have any place whatsoever in the discourse "bin Laden." That is why, in this unleashing of violence without name, if I had to take one of the two sides and choose in a binary situation, well, I would. Despite my very strong reservations about the American, indeed European, political posture, about the "international antiterrorist" coalition, despite all the de facto betrayals, all the failures to live up to democracy, international law, and the very international institutions that the states of this "coalition" themselves founded and supported up to a certain point, I would take the side of the camp that, in principle, by right of law, leaves a perspective open to perfectibility in the name of the "political," democracy, international law, international institutions, and so on. Even if this "in the name of" is still merely an assertion and a purely verbal commitment. Even in its most cynical mode, such an assertion still lets resonate within it an invincible promise . I don't hear any such promise coming from "bin Laden," at least not one for this world. NATO Obama overreach triggers end of allied intel cooperation and dooms NATO Tom Parker 12, Former Policy Dir. for Terrorism, Counterterrorism and H. Rts. at Amnesty International, U.S. Tactics Threaten NATO, September 17, http://nationalinterest.org/commentary/us-tactics-threaten-nato-7461 A growing chasm in operational practice is opening up between the United States and its allies in NATO. This rift is putting the Atlantic alliance at risk. Yet no one in Washington seems to be paying attention. The escalating use of unmanned aerial vehicles to strike terrorist suspects in an increasing number of operational environments from the Arabian Peninsula to Southeast Asia, coupled with the continued use of military commissions and indefinite detention, is driving a wedge between the United States and its allies. Attitudes across the Atlantic are hardening fast. This isn’t knee-jerk, manon-the-street anti-Americanism. European governments that have tried to turn a blind eye to U.S. counterterrorism practices over the past decade are now forced to pay attention by their own courts, which will restrict cooperation in the future. As recently as last month, the German federal prosecutor’s office opened a probe into the October 2010 killing of a German national identified only as “Buenyamin E.” in a U.S. drone strike in Pakistan. There are at least four other similar cases involving German nationals and several reported strikes involving legal residents of the United Kingdom. In March, Polish prosecutors charged the former head of Polish intelligence, Zbigniew Siemiatkowski, with “unlawfully depriving prisoners of the their liberty” because of the alleged role he played in helping to establish a CIA secret prison in northeastern Poland in 2002–2003. Last December, British Special Forces ran afoul of the UK courts for informally transferring two Al Qaeda suspects detained in Iraq, Yunus Rahmatullah and Amanatullah Ali, to U.S. forces. The British government has been instructed to recover the men from U.S. custody or face legal sanctions that could result in two senior ministers being sent to prison. Perhaps the most dramatic example illustrating the gap that has opened up between the United States and its European allies concerns the 2009 in absentia conviction of twenty-three U.S. agents in an Italian court Britain, Poland, Italy and Germany are among America’s closest military partners. Troops from all four countries are currently serving alongside U.S. forces in Afghanistan, but they are now operating within a very different set of constraints than their U.S. counterparts. The European Court of Human Rights established its jurisdiction over stabilization operations in Iraq, and by implication its writ extends to Afghanistan as well. The British government for the role they played in the extraordinary rendition of radical Imam Hassan Mustafa Osama Nasr from Milan to Cairo. has lost a series of cases before the court relating to its operations in southern Iraq. This means that concepts such as the right to life, protection from arbitrary punishment, the possibility that intelligence provided by any of America’s European allies could be used to target a terrorism suspect in Somalia or the Philippines for a lethal drone strike now raises serious criminal liability issues for the Europeans. The United States conducts such operations under the legal theory that it is in an international armed conflict with Al Qaeda and its affiliates that can be pursued anywhere on the globe where armed force may be required. But not one other member of NATO shares this legal analysis, which flies in the face of established international remedy and due process apply in areas under the effective control of European forces. Furthermore, legal norms. The United States may have taken issue with the traditional idea that wars are fought between states and not between states and criminal gangs, but its allies have intelligence services have been surprisingly open about the “inhibitions” that this growing divergence has caused the transatlantic special relationship, telling Parliament that it has become an obstacle to intelligence sharing. European attitudes are not going to change—the European Court of Human Rights is now deeply embedded in European life, and individual European governments cannot escape its oversight no matter how well disposed they not. The heads of Britain’s foreign and domestic are to assist the United States. The United States has bet heavily on the efficacy of a new array of counterterrorism powers as the answer to Al Qaeda. In doing so it has evolved a concept of operations that has much more in common with the approach to terrorist threats taken by Israel and Russia than by its European partners. There even as the Obama administration doubles down and extends their use. Meanwhile, some of America’s oldest and closest allies are beginning to place more and more constraints on working with U.S. forces. NATO cannot conduct military operations under two competing legal regimes for long. Something has to give—and it may just be the Atlantic alliance. has been little consideration of the wider strategic cost of these tactics, Nuclear war Brzezinski 9 (Zbigniew, former U.S. National Security Adviser, Sept/Oct 2009, “An Agenda for NATO,” Foreign Affairs, 88.5, Ebsco) NATO's potential is not primarily military. Although NATO is a collective-security alliance, its actual military power comes predominantly from the United States, and that reality is not likely to change anytime soon. NATO's real power derives from the fact that it combines the United States' military capabilities and economic power with Europe's collective political and economic weight (and occasionally some limited European military forces). Together, that combination makes NATO globally significant. It must therefore remain sensitive to the importance of safeguarding the geopolitical bond between the United States and Europe as it addresses new tasks. The basic challenge that NATO now confronts is that there are historically unprecedented risks to global security. Today's world is threatened neither by the militant fanaticism of a territorially rapacious nationalist state nor by the coercive aspiration of a globally pretentious ideology embraced by an expansive imperial power. The paradox of our time is that the world, increasingly connected and economically interdependent for the first time in its entire history, is experiencing intensifying popular unrest made all the more menacing by the growing accessibility of weapons of mass destruction -- not just to states but also, potentially, to extremist religious and political movements. Yet there is no effective global security mechanism for coping with the growing threat of violent political chaos stemming from humanity's recent political awakening. The three great political contests of the twentieth century (the two world wars and the Cold War) accelerated the political awakening of mankind, which was initially unleashed in Europe by the French Revolution. Within a century of that revolution, spontaneous populist political activism had spread from Europe to East Asia. On their return home after World Wars I and II, the South Asians and the North Africans who had been conscripted by the British and French imperial armies propagated a new awareness of anticolonial nationalist and religious political identity among hitherto passive and pliant populations. The spread of literacy during the twentieth century and the wide-ranging impact of radio, television, and the Internet accelerated and intensified this mass global political awakening . In its early stages, such new political awareness tends to be expressed as a fanatical embrace of the most extreme ethnic or fundamentalist religious passions, with beliefs and resentments universalized in Manichaean categories. Unfortunately, in significant parts of the developing world, bitter memories of European colonialism and of more recent U.S. intrusion have given such newly aroused passions a distinctively anti-Western cast. Today, the most acute example of this phenomenon is found in an area that stretches from Egypt to India. This area, inhabited by more than 500 million politically and religiously aroused peoples, is where NATO is becoming more deeply embroiled. Additionally complicating is the fact that the dramatic rise of China and India and the quick recovery of Japan within the last 50 years have signaled that the global center of political and economic gravity is shifting away from the North Atlantic toward Asia and the Pacific. And of the currently leading global powers -- the United States, the EU, China, Japan, Russia, and India -- at least two, or perhaps even three, are revisionist in their orientation. Whether they are "rising peacefully" (a self-confident China), truculently (an imperially nostalgic Russia) or boastfully (an assertive India, despite its internal multiethnic and religious vulnerabilities), they all desire a change in the global pecking order. The future conduct of and relationship among these three still relatively cautious revisionist powers will further intensify the strategic uncertainty. Visible on the horizon but not as powerful are the emerging regional rebels, with some of them defiantly reaching for nuclear weapons. North Korea has openly flouted the international community by producing (apparently successfully) its own nuclear weapons -- and also by profiting from their dissemination. At some point, its unpredictability could precipitate the first use of nuclear weapons in anger since 1945. Iran, in contrast, has proclaimed that its nuclear program is entirely for peaceful purposes but so far has been unwilling to consider consensual arrangements with the international community that would provide credible assurances regarding these intentions. In nuclear-armed Pakistan, an extremist anti-Western religious movement is threatening the country's political stability. These changes together reflect the waning of the postWorld War II global hierarchy and the simultaneous dispersal of global power. Unfortunately, U.S. leadership in recent years unintentionally, but most unwisely, contributed to the currently threatening state of affairs. The combination of Washington's arrogant unilateralism in Iraq and its demagogic Islamophobic sloganeering weakened the unity of NATO and focused aroused Muslim resentments on the United States and the West more generally. 2AC Law Enforcement Key The aff shifts to a law enforcement approach to CT---only the aff’s approach solves Seth G. Jones 8, adjunct professor at Johns Hopkins University's School for Advanced International Studies; associate director of the International Security and Defense Policy Center at the RAND Corporation, specializing in counterinsurgency and counterterrorism. PhD and ** Martin C Libicki, Spent 12 years at the National Defense University. Senior management scientist at the RAND Corporation. Ph.D. in economics, M.A. in city and regional planning, University of California, Berkeley. How Terrorist Groups End: Lessons for Countering al Qa'ida, www.rand.org/pubs/research_briefs/RB9351/index1.html The United States cannot conduct an effective counterterrorism campaign against al Qa'ida or other terrorist groups without understanding how such groups end. While it is clear that U.S. policymakers will need to turn to a range of policy instruments to conduct such campaigns — including careful police and intelligence work, military force, political negotiations, and economic sanctions — what is less clear is how they should prioritize U.S. efforts .¶ A recent RAND research effort sheds light on this issue by investigating how terrorist groups have ended in the past. By analyzing a comprehensive roster of terrorist groups that existed worldwide between 1968 and 2006, the authors found that most groups ended because of operations carried out by local police or intelligence agencies or because they negotiated a settlement with their governments. Military force was rarely the primary reason a terrorist group ended, and few groups within this time frame achieved victory.¶ These findings suggest that the U.S. approach to countering al Qa'ida has focused far too much on the use of military force. Instead, policing and intelligence should be the backbone of U.S. efforts.¶ First Systematic Examination of the End of Terrorist Groups¶ This was the first systematic look at how terrorist groups end. The authors compiled and analyzed a data set of all terrorist groups between 1968 and 2006, drawn from a terrorism-incident database that RAND and the Memorial Institute for the Prevention of Terrorism jointly oversee. The authors used that data to identify the primary reason for the end of groups and to statistically analyze how economic conditions, regime type, size, ideology, and group goals affected their survival. They then conducted comparative case studies of specific terrorist groups to understand how they ended.¶ Of the 648 groups that were active at some point between 1968 and 2006, a total of 268 ended during that period. Another 136 groups splintered, and 244 remained active. As depicted in the figure, the authors found that most ended for one of two reasons: They were penetrated and eliminated by local police and intelligence agencies (40 percent), or they reached a peaceful political accommodation with their government (43 percent). Most terrorist groups that ended because of politics sought narrow policy goals. The narrower the goals, the more likely the group was to achieve them through political accommodation — and thus the more likely the government and terrorists were to reach a negotiated settlement.¶ How 268 Terrorist Groups Worldwide Ended, 1968–2006¶ How 268 Terrorist Groups Worldwide Ended, 19682006¶ In 10 percent of cases, terrorist groups ended because they achieved victory. Military force led to the end of terrorist groups in 7 percent of cases. The authors found that militaries tended to be most effective when used against terrorist groups engaged in insurgencies in which the groups were large, well armed, and well organized. But against most terrorist groups, military force was usually too blunt an instrument. ¶ The analysis also found that¶ religiously motivated terrorist groups took longer to eliminate than other groups but rarely achieved their objectives; no religiously motivated group achieved victory during the period studied.¶ size significantly determined a group's fate. Groups exceeding 10,000 members were victorious more than 25 percent of the time, while victory was rare for groups below 1,000 members. ¶ terrorist groups from upper-income countries are much more likely to be left-wing or nationalist and much less likely to be motivated by religion.¶ Police-Oriented Counterterrorism Rather Than a “War on Terrorism”¶ What does this mean for counterterrorism efforts against al Qa'ida? After September 11, 2001, U.S. strategy against al Qa'ida concentrated on the use of military force. Although the United States has employed nonmilitary instruments — cutting off terrorist financing or providing foreign assistance, for example — U.S. policymakers continue to refer to the strategy as a “war on terrorism.” ¶ But military force has not undermined al Qa'ida. As of 2008, al Qa'ida has remained a strong and competent organization. Its goal is intact: to establish a pan-Islamic caliphate in the Middle East by uniting Muslims to fight infidels and overthrow West-friendly regimes. It continues to employ terrorism and has been involved in more terrorist attacks around the world in the years since September 11, 2001, than in prior years, though engaging in no successful attacks of a comparable magnitude to the attacks on New York and Washington. ¶ Al Qa'ida's resilience should trigger a fundamental rethinking of U.S. strategy. Its goal of a pan-Islamic caliphate leaves little room for a negotiated political settlement with governments in the Middle East. A more effective U.S. approach would involve a two-front strategy:¶ Make policing and intelligence the backbone of U.S. efforts. Al Qa'ida consists of a network of individuals who need to be tracked and arrested. This requires careful involvement of the Central Intelligence Agency and Federal Bureau of Investigation, as well as their cooperation with foreign police and intelligence agencies.¶ Minimize the use of U.S. military force. In most operations against al Qa'ida, local military forces frequently have more legitimacy to operate and a better understanding of the operating environment than U.S. forces have. This means a light U.S. military footprint or none at all. ¶ Key to this strategy is replacing the war-onterrorism orientation with the kind of counterterrorism approach that is employed by most governments facing significant terrorist threats today. Calling the efforts a war on terrorism raises public expectations — both in the United States and elsewhere — that there is a battlefield solution. It also tends to legitimize the terrorists' view that they are conducting a jihad (holy war) against the United States and elevates them to the status of holy warriors. Terrorists criminals, not holy warriors. should be perceived as FW AT: Prior Questions – Cochrane Prior questions will never be fully settled---must take action even under conditions of uncertainty Molly Cochran 99, Assistant Professor of International Affairs at Georgia Institute for Technology, “Normative Theory in International Relations”, 1999, pg. 272 To conclude this chapter, while modernist and postmodernist debates continue, while we are still unsure as to what we can legitimately identify as a feminist ethical/political concern, while we still are unclear about the relationship between discourse and experience, it is particularly important for feminists that we proceed with analysis of both the material (institutional and structural) as well as the discursive. This holds not only for feminists, but for all theorists oriented towards the goal of extending further moral inclusion in the present social sciences climate of epistemological uncertainty. Important ethical/political concerns hang in the balance. We cannot afford to wait for the meta-theoretical questions to be conclusively answered. Those answers may be unavailable. Nor can we wait for a credible vision of an alternative institutional order to appear before an emancipatory agenda can be kicked into gear. Nor do we have before us a chicken and egg question of which comes first: sorting out the metatheoretical issues or working out which practices contribute to a credible institutional vision. The two questions can and should be pursued together, and can be via moral imagination. Imagination can help us think beyond discursive and material conditions which limit us, by pushing the boundaries of those limitations in thought and examining what yields. In this respect, I believe international ethics as pragmatic critique can be a useful ally to feminist and normative theorists generally. Galli/Chow AT: Galli Their FW of a “politics of space” is meaningless Claudio Minca 12 Wageningen University Professor, May, Carlo Galli, Carl Schmitt, and contemporary Italian political thought, Political Geography, 31.4 The main problem with this otherwise fascinating excursus, however, is Galli’s rather confused conceptualization of space, presented in the first pages of the book (pp. 5–6):¶ our second hypothesis is that the spatial representations that are implicit in political thought derive from the concrete perception and organization of geographic space as experienced by a given society. The implicit spatial representations of political thought, in other words, refer back to the explicit displacement of space realized by the concrete articulations of power and powers on the world stage¶ our third hypothesis [.] is that modernity entertains a particularly difficult relationship with space , in which the dominant element is political (centered on the Subject, State and Society), and not space understood in a natural sense¶ finally, our fourth hypothesis [.] is that the politico-spatial categories of the Modern are no longer usable today.¶ For Galli, space seems to be sometimes a ‘measure of the real’, that is, a theory of space – while at other times, he refers to space as something ‘out there’, something very concrete. It may well be that Galli thinks that space is both – but then this should be made clear in the first place. The result is that after reading Spazi Politici three times I am not yet sure what ‘kind of space’ he is conceptualizing in relation to politics. This perplexity gets even greater when Galli discusses the ‘a-spatial’ condition of globalization (p. 157). Or, when he refers to the artificiality of spatial thinking (compared to place thinking?) (see pp. 85). This is an important point, since the entire collection (the three books/essays that make Political Spaces and Global War) is marked by this lack of clarity about the conceptualization of space. I am left with the impression that this is also the result of the confusion/overlapping between terminologies of space and territory – two concepts normally kept clearly distinct in both Italian and Francophone geography– that dominates Galli’s account.¶ What is also missing is a clear definition of power, in relation to space. How can space be related to politics with no clear conceptualization of power? I would like to suggest, with the risk of falling into the trap of disciplinary parochialism, that some of these problems could have possibly been avoided Galli had been interested in engaging with some of the literature in critical geography of the past few decades where those very concepts are discussed at length and in rather sophisticated ways. Interestingly, Galli does refer to geography in several passages of Spazi Politici, but he seems to get most of the references wrong. And when he compares his project with that of ‘political geography’, it is not at all clear what the nature of this latter project is supposed to be. Reinscribes Western hegemony Nicole Curato 10, University of the Philippines, Political Spaces and War, http://bit.ly/16pp6Ig Immediately, students of sociology can locate Galli’s work in the broader theoretical debate about the nature of social change—whether it is characterized by rupture or continuity, whether we live in a postmodern condition or the second phase of modernity. Galli belongs to the first camp, describing globalization as marking a new epochality , and, as in the case of a number of other contemporary social theorists, sets himself up with the task of finding suitable interpretations for illuminating distinct processes happening today. On the one hand, his approach is refreshing in that he successfully prioritizes nuances over ideal types, dynamic processes over conceptual binaries. This approach allowed him to make measured generalizations and engage related literature in a fair, thoughtful, and intellectually charitable manner. On the other hand, however, Galli struggles in overcoming the practice of presupposing or uncritically placing the European narrative of modernity at the center of his discussion . Throughout the book, Europe remains to be the “silent referent of historical knowledge,” undermining other narratives of human inter-connections that are also cross-border, if not “global” in character, prior to postmodernity (D. Chakrabarty, “Provincializing Europe: Postcoloniality and the critique of history,” Cultural Studies, 6.3 [1992]: 337–57). This is particularly troublesome as Galli utilizes a genealogical approach in mapping the evolution of political spaces to one that takes a global character. To uncritically use Europe as central historical referent limits the book’s potential for breaking away from modernity’s epistemology and providing an alternative politics for knowledge production. Nevertheless, this book puts forward an exciting contribution to the discussion on the relevance of modernity’s conceptual categories in the postmodern condition—a suitable reading for both students and scholars of politics, sociology, and political geography. AT: Chow Zero risk of their Chow impact---instrumental knowledge production doesn’t cause violence and discursive criticism could never solve it anyway Ken Hirschkop 7, Professor of English and Rhetoric at the University of Waterloo, July 25, 2007, “On Being Difficult,” Electronic Book Review, online: http://www.electronicbookreview.com/thread/criticalecologies/transitive This defect - not being art - is one that theory should prolong and celebrate, not remedy. For the most egregious error Chow makes is to imagine that obstructing instrumentalism is somehow a desirable and effective route for left-wing politics. The case against instrumentalism is made in depth in the opening chapter, which argues with reference to Hiroshima and Nagasaki that "[t]he dropping of the atomic bombs effected what Michel Foucault would call a major shift in epistemes, a fundamental change in the organization, production and circulation of knowledge" (33). It initiates the "age of the world target" in which war becomes virtualized and knowledge militarized, particularly under the aegis of so-called "area studies". It's hard not to see this as a Pacific version of the notorious argument that the Gulag and/or the Holocaust reveal the exhaustion of modernity. And the first thing one has to say is that this interpretation of war as no longer "the physical, mechanical struggles between combative oppositional groups" (33), as now transformed into a matter technology and vision, puts Chow in some uncomfortable intellectual company: like that of Donald Rumsfeld, whose recent humiliation is a timely reminder that wars continue to depend on the deployment of young men and women in fairly traditional forms of battle. Pace Chow, war can indeed be fought, and fought successfully, "without the skills of playing video games" (35) and this is proved, with grim results, every day. But it's the title of this new epoch - the title of the book as well - that truly gives the game away. Heidegger's "Age of the World Picture" claimed that the distinguishing phenomena of what we like to call modernity - science, machine technology, secularization, the autonomy of art and culture - depended, in the last instance, on a particular metaphysics, that of the "world conceived of and grasped as a picture", as something prepared, if you like, for the manipulations of the subject. Against this vision of "sweeping global instrumentalism" Heidegger set not Mallarmé, but Hölderlin, and not just Hölderlin, but also "reflection", i.e., Heidegger's own philosophy. It's a philosophical reprise of what Francis Mulhern has dubbed "metaculture", the discourse in which culture is invoked as a principle of social organization superior to the degraded machinations of "politics", degraded machinations which, at the time he was composing this essay, had led Heidegger to lower his expectations of what National Socialism might achieve. In the fog of metaphysics, every actually existing nation - America, the Soviet Union, Germany looks just as grey, as does every conceivable form of politics. For the antithesis of the "world picture" is not a more just democratic politics, but no politics at all, and it is hard to see how this stance can serve as the starting point for a political critique. If Chow decides to pursue this unpromising path anyhow, it is probably because turning exploitation, military conquest and prejudice into so many epiphenomena of a metaphysical "instrumentalism" grants philosophy and poetry a force and a role in revolutionising the world that would otherwise seem extravagant. Or it would do, if "instrumentalism" was, as Chow claims a "demotion of language", if language was somehow more at home exulting in its own plenitude than merely referring to things. Poor old language. Apparently ignored for centuries, it only receives its due when poststructuralists force us to acknowledge it. In their hands, "language flexes its muscles and breaks the chains of its hitherto subordination to thought" and, as a consequence, "those who pursue poststructuralist theory in the critical writings find themselves permanently at war with those who expect, and insist on, the transparency - that is, the invisibility - of language as a tool of communication" (48). We have been down this road before and will no doubt go down it again. In fact, it's fair to say this particular journey has become more or less the daily commute of critical theory, though few have thought it ought to be described in such openly military terms. There is good reason, however, to think Chow's chosen route will lead not to the promised land of resistance and emancipation, but to more Sisyphean frustration. In fact, there are several good reasons. Chandler The affirmatives embrace of a law enforcement approach to terrorism is necessary to solve global war---the alt reifies the status quo which embraces uncertainty David Chandler 9, Professor of International Relations at the Department of Politics and International Relations, University of Westminster, War Without End(s): Grounding the Discourse of `Global War', Security Dialogue 2009; 40; 243 International law evolved on the basis of the ever-present possibility of real war between real enemies. Today’s global wars of humanitarian intervention and the ‘war on terror’ appear to be bypassing or dismantling this framework of international order. Taken out of historical context, today’s period might seem to be analogous to that of the imperial and colonial wars of the last century, which evaded or undermined frameworks of international law, which sought to treat the enemy as a justus hostis – a legitimate opponent to be treated with reciprocal relations of equality. Such analogies have enabled critical theorists to read the present through past frameworks of strategic political contestation, explaining the lack of respect for international law and seemingly arbitrary and ad hoc use of military force on the basis of the high political stakes involved. Agamben’s argument that classical international law has dissipated into a ‘permanent state of exception’, suggesting that we are witnessing a global war machine – constructing the world in the image of the camp and reducing its enemies to bare life to be annihilated at will – appears to be given force by Guantánamo Bay, extraordinary rendition and Abu Ghraib. Yet, once we go beyond the level of declarations of policy values and security stakes, the practices of Western militarism fit uneasily with the policy discourses and suggest a different dynamic: one where the lack of political stakes in the international sphere means that there is little connection between military intervention and strategic planning. In fact, as Laïdi suggests, it would be more useful to understand the projection of violence as a search for meaning and strategy rather than as an instrumental outcome. To take one leading example of the ‘unlimited’ nature of liberal global war: the treatment of terrorist suspects held at Guantánamo Bay, in legal suspension as ‘illegal combatants’ and denied Geneva Red Cross conventions and prisoner-of-war status. The ‘criminalization’ of the captives in Guantánamo Bay is not a case of reducing their status to criminals but the development of an exceptional legal category. In fact, far from criminalizing fundamentalist terrorists, the USA has politically glorified them, talking up their political importance. It would appear that the designation of ‘illegal combatants’ could be understood as an ad hoc and arbitrary response to the lack of a clear strategic framework and ‘real enemy’. In this context, the concept of criminalization needs to be reconsidered. Guantánamo Bay can be seen instead as an attempt to create an enemy of special status. In fact, with reference to Agamben’s thesis, it would be better to understand the legal status of the ‘illegal combatants’ as sacralizing them rather than reducing them to the status of ‘bare life’. In acting in an exceptional way, the USA attempted to create a more coherent and potent image of the vaguely defined security threat This approach is very different, for example, from the framework of criminalization used by the British government in the fight against Irish republicanism, where the withdrawal of prisoner-of-war status from republican prisoners was intended to delegitimize their struggle and was a strategic act of war. Ironically, whereas the criminalization of the republican struggle was an attempt to dehumanize the republicans – to justify unequal treatment of combatants – the criminalization of global terrorists has served to humanize them in the sense of giving coherence, shape and meaning to a set of individuals with no clear internally generated sense of connection. Far from ‘denying the enemy the very quality of being human’, it would appear that the muchpublicized abuses of the ‘war on terror’ stem from the Western inability to cohere a clear view of who the enemy are or of how they should be treated. The policy frameworks of global war attempt to make sense of the implosion of the framework of international order at the same time as articulating the desire to recreate a framework of meaning through policy activity. However, these projections of Western power, even when expressed in coercive and militarized forms, appear to have little connection to strategic or instrumental projects of hegemony . The concept of ‘control’, articulated by authors such as Carl Schmitt and Faisal Devji, seems to be key to understanding the transition from strategic frameworks of conflict to today’s unlimited (i.e. arbitrary) expressions of violence. Wars fought for control, with a socially grounded telluric character, are limited by the needs of instrumental rationality: the goals shape the means deployed. Today’s Western wars are fought in a nonstrategic, non-instrumental framework, which lacks a clear relationship between means and ends and can therefore easily acquire a destabilizing and irrational character. To mistake the arbitrary and unlimited nature of violence and coercion without a clear strategic framework for a heightened desire for control fails to contextualize conflict in the social relations of today . Orientalism Varisco Diagnosis of problems in our methodology fails in the absence of a positive alt to orientalism---pragmatic policy key Dr. Daniel Martin Varisco 7, is chair of anthropology and director of Middle Eastern and Central Asia studies at Hofstra University. He is fluent in Arabic and has lived in the Middle East (Yemen, Egypt, Qatar) for over 5 years since 1978. He has done fieldwork in Yemen, Egypt, Qatar, U.A.E. and Guatemala, Reading orientalism: said and the unsaid, Google Books In sum, the essential argument of Orientalism is that a pervasive and endemic Western discourse of Orientalism has constructed "the Orient," a representation that Said insists Academicized Orientalism is thus as "the magic wand of Western domination of the 0rient not only is perversely false but prevents the authentic rendering of a real Orient, even by Orientals themselves. dismissed, in the words of one critic, ."283i The notion of a single conceptual essence of Orient is the linchpin in Said's polemical reduction of all Western interpretation of the real or imagined geographical space to a single and latently authentic Orients are not imaginable in the text. The Orient is rhetorically available for Said simply by virtue of not really being anywhere. Opposed to this Orient is the colonialist homogeneous discourse. Read through Orientalism and only the Orient of Western Orientalism is to be encountered; West, exemplified by France, Britain, and the United States. East versus West, Occident over Orient: this is the debilitating binary that has framed the unending debate over the polemical charge by Said that scholars who study the Middle East and Islam still do so institutionally through an interpretive sieve that divides a superior West from an inferior East. Dominating the debate has been a tiresome point/counterpoint on whether literary critic Edward Said or historian Bernard Lewis knows best. Here is where the dismissal of academic Orientalism has gone wrong. Over and over again the same problem is raised. Does the Orient as several generations of Orientalism. A generation of students across disciplines has grown up with limited challenges to Western travelers, novelists, theologians, politicians, and scholars discoursed it really exist? To not recognize this as a fundamentally rhetorical question because of Edward Said is, nolo contendere, nonsense. No serious scholar can assume a meaningful cultural entity called "Orient" after reading Said's Orientalism; some had said so before Said wrote Most of his readers agreed with the thrust of the Orientalism thesis because they shared the same frustration with misrepresentation. There is no rational retrofit between the imagined Orient, resplendent in epic tales and art, and the space it consciously or unwittingly misrepresented. However, there was and is a real Orient, flesh-and-blood people, viable cultural traditions, aesthetic domains, documented history, and an ongoing intellectual engagement with the past, present, and future. What is missing from Orientalism is any systematic sense of what that real Orient was and how individuals reacted to the imposing forces that sought to his polemic. label it and theoretically control it. ASLEEP IN ORIENTALISM'S WAKE I have avoided taking stands on such matters as the real, true or authentic Islamic or Arab world. — the book itself provides no blueprint for how to proceed.=84 Said's approach is of the cut-and-paste variety—a dash of Foucauldian discourse EDWARD SAID, "ORIENTALISM RECONSIDERED" Orientalism is frequently praised for exposing skeletons in the scholarly closet, but here and a dram of Gramscian hegemony there—rather than a howto model. In his review of Orientalism, anthropologist Roger Joseph concludes: Said has presented a thesis If discourse, by its very metanature, is destined to misrepresent and to be mediated by all sorts of private agendas, how can we represent cultural systems in ways that will allow us to escape the very dock in which Said has placed the Orientalists? The aim of the book was not to answer that that on a number of counts is quite compelling. He seems to me, however, to have begged one major question. question, but surely the book itself compels us to ask the question of its author.a85 Another cultural anthropologist, Charles Iindholm, criticizes Said's thesis for its "rejection of the possibility of constructing general comparative arguments about Middle Eastern cultures.286 Akbar Ahmed, a native Pakistani trained in British anthropology, goes so far as to chide Said for leading scholars into "an intellectual cul-de- sac."287 For a historian's spin, Peter Gran remarks in a favorable review that Said "does not fully work out the post-colonial metamorphosis."288 As critic Rey Chow observes, " Said's work begs the question as to how otherness—the voices, could become a genuine oppositional force languages, and cultures of those who have been and continue to be marginalized and silenced— and a usable value." Said's revisiting and reconsidering of Orientalism, as well as his literary expansion into a de-geographicalized Culture and Imperialism, never resolved the suspicion that the question still goes begging. There remains an essential problem. Said's periodic vacillation in Orientalism on whether or not the Orient could have a true essence leads him to an infinity of mere representations, presenting a default persuasive act by not representing that reality for himself and the reader. If Said claims that Orientalism created the false essence of an Orient, and critics counterclaim that Said himself proposes a false essence of Orientalism, how do we end the cycle of guilt by essentialization? Is there a way out of this epistemologieal morass? If not a broad way to truth, at least a narrow path toward a clearing? With most of the old intellectual sureties now crumbling, the prospect of ever finding a consensus is numbing, in part because the formidably linguistic roadblocks are—or at least should be—humbling. The history of mystical ontologies aside, the barrier that has thus far proved unbreachable is the very necessity of using language, reducing material reality and imaginary potentiality to mere words. As long as concepts are essential for understanding and communication, reality—conterminous concept that it must be—will be embraced through worded essences. Reality must be represented, like it or not, so how is it to be done better? Neither categorical nor canonical Truth" need be of the essence. One of the pragmatic results of much postmodern philosophy, aided by Orientalist and ethnographic renderings of the panhumanities writ and unwrit large, is littered with searches for meaning. Yet, criticism is the conscious subversion of belief in a singular Truth" in which any given pronouncement could be ascribed the eternal verity once reserved for holy writ. In rational all truths are limited by the inescapable force of pragmatic change. Ideas with "whole truth" in them can Intellectual activity proceeds by characterizing verbally what is encountered and by reducing the complex to simpler and more graspable elements. A world without proposed and debated essences would be an unimaginable realm with no imagination, annotation without nuance, activity without art. I suggest inquiry, only be patched together for so long. that when cogito ergo sum is melded with "to err is human," essentialization of human realities becomes less an unresolvable problem and more a profound challenge. Contra Said's polemical contentions, not all that has been created discursively about an Orient is essentially wrong or without redeeming intellectual value. Edward Lane and Sir Richard Burton can be read for valuable firsthand observations despite their ethnocentric baggage. Wilfrid and Anne Blunt can be appreciated for their moral suasion. TheJ 'accuse of criticism must be tempered constructively with the louche of everyday human give-and-take. In planed biblical English, it is helpful to see that the beam in one's own rhetorical eye usually blocks appreciation of the mote in the other's eye. Speaking truth to power a la Said's oppositional criticism is appealing at first glance, but speaking truths to varieties of ever-shifting powers is surely a more productive process for a pluralistic society. As Richard King has eloquently put it, "Emphasis upon the diversity, fluidity and complexity within as well as between cultures precludes a reification of their differences and allows one to avoid the kind of monadic essentialism that Contrasted essentialisms, as the debate over Orientalism bears out, do not rule each other out. Claiming that an argument is essentialist does not disprove it; such a ploy serves mainly to taint the ideas opposed and thus tends to rhetorically mitigate opposing views. Thesis countered by antithesis becomes sickeningly cyclical without a willingness to negotiate synthesis. The critical irony is that Said, the author as advocate who at times denies agency to authors as individuals, uniquely writes and frames the entire script of his own text. Texts, in the loose sense of anything conveniently fashioned with words, become the meter for Said's poetic performance. The historical backdrop is hastily arranged, not systematically researched, to authorize the staging of his argument. The past becomes the whiggishly drawn rationale for pursuing a present grievance. As the historian Robert Berkhofer suggests, Said "uses many voices to exemplify the stereotyped view, but he makes no attempt to show how renders cross-cultural engagement an a priori impossibility from the outset."2?0 the new self/other relationship ought to be represented. Said's book does not practice what it preaches multiculturally."29i Said's method, Berkhofer continues, is to "quote past persons and paraphrase them to reveal their viewpoints as stereotyped and hegemonic." Napoleon's savants, Renan's racism, and Flaubert's flirtations serve to accentuate the complicity of modern-day social scientists who support Israel. Orientalism is a prime example of a historical study with one voice and one viewpoint. Some critics have The voice of dissent, the critique (of Orientalism or any other hegemonic discourse) does not need to propose an alternative for the critique to be effective argued in rhetorical defense of Said that he should not be held accountable for providing an alternative. and valid," claim Ashcroft and Ahluwalia.29= Saree Makdisi suggests that Said's goal in Orientalism is "to specify the constructedness of reality" rather than to "unmask and dispel" the illusion of Orientalist discourse.=93 Timothy Brennan argues that Said's aim is not to describe the "brute reality" of a real Orient but rather to point out the "relative indifference" of Western intellectuals to that reality.=94 Certainly no author is under an invisible hand of presumption to solve a problem he or she wishes to expose. Yet, it is curious that Said would not want to suggest an alternative, to directly engage the issue of how the "real" Orient could be represented. He reacts forcefully to American literary critics of the "left" who fail to specify the ideas, values, and engagement being urged.=95 If, as Said, insists "politics is something more than liking or disliking some intellectual orthodoxy now holding sway over a department of literature,"=9'6 then why would he not follow through with what this "something more" might be for the discourse he calls Having become concerned with an essentially political problem, the Arab intelligentsia must inevitably reach the stage where it passes from diagnosis of the situation to prescription of remedial action. Why should I escape this rule?"=97 This is a question that escapes Edward Said in Orientalism, although it imbues his life work as an advocate against ethnocentric bias. CLASH TALKING AD NAUSEAM The questioning of whether or not there really is an Orient, a West, or a unified discourse called Orientalism might be relatively harmless philosophical musing, were it not for the contemporary, confrontational political involvement of the United States and major European nations with buyable governments and bombable people in the Middle East. One of the reasons Said's book has been Orientalism? As Abdallah Laroui eloquently asks, " so influential, especially among scholars in the emerging field of post-colonial studies, is that it appeared at the very moment in which the Cold War divide reached a zenith in Middle East politics. In 1979, the fall of the United States-backed and anti-communist Shah allowed for the creation of the first modern Islamic republic in Iran, even as the the escalation of tension and violence sometimes described as "Islamic terrorism" has become a pressing global concern. In the climate of renewed Soviet Union invaded Afghanistan to try to prevent the same thing happening there. Almost three decades later, American and British political engagement in Afghanistan and Iraq after September 11, 2001, the essential categories of East and West continue to dominate public debate through the widely touted mantra of a "clash of civilizations.* The idea of civilizations at war with each other is probably as old as the very idea of civilization. The modern turn of phrase owes its current popularity to the title of a 1993 Foreign Affairs article by political historian Samuel Huntington, although this is quite clearly a conscious borrowing from a 1990 Atlantic Monthly article by Said's nemesis, Bernard Lewis. Huntington, speculating in an influential policy forum, suggests that Arnold Toynbee's outdated list of twenty-one major civilizations had been reduced after the Cold War to six, to which he adds two more. With the exception of his own additions of Latin America and Africa, the primary rivals of the West, according to his list, are currently Confucian, Japanese, Islamic, Hindu, and Slavic-Orthodox. To say, as Huntington insists, that the main criterion separating these civilizations is religion, given the labels chosen, borders on the tautological.2?8 But logical order here would suggest that the West be seen as Christian, given its dominant religion. In a sense, Huntington echoes the simplistic separation of the West from the Rest, for secular Western civilization is clearly the dominant and superior system in his mind. The rejection of the religious label for his own civilization, secular as it might appear to him, seriously imbalances Huntington's civilizational breakdown. It strains credulity to imagine that religion in itself is an independent variable in the contemporary world of nation-states that make up the transnationalized mix of cultural identities outside the United Sates and Europe. Following earlier commentary of Bernard Lewis, Huntington posits a "fault line" between the West and Islamic civilization ever since the Arabs were turned back in 732 CE at the Battle of Tours.=99 The fault of Islam, however, appears to be less religious than politie-al and ideological. The fundamental clash Huntington describes revolves around the seeming rejection by Islam (and indeed all the rest) of "Western ideas of individualism, liberalism, constitutionalism, human rights, equality, liberty, the rule of law, democracy, free markets, the separation of church and state/300 In citing this neoconservative laundry list, Huntington is blind to the modern history of Western nations. He assumes that these idealized values have in fact governed policy in Europe and America, as though divine kingship, tyranny, and fascism have not plagued European history. Nor is it credible to claim that such values have all been rejected by non-Western nations. To assert, for example, that the rule of law is not consonant with Islam, or that Islamic teaching is somehow less concerned with human rights than Western governments, implies that the real clash is between Huntington's highly subjective reading of a history he does not know very well and a current reality he does not like. Huntington's thesis was challenged from the start in the very next issue of Foreign Affairs. "But Huntington is wrong," asserts Fouad Ajami.301 Even former U. N. Ambassador Jeane Kirkpatrick, hardly a proponent of postcolonial criticism, called Huntington's list of civilizations 'strange."3°= Ironically, both Ajami and Kirkpatrick fit Said's vision of bad-faith Orientalism. Being wrong in the eyes of many of his peers did not prevent Huntington from expanding the tentative proposals of a controversial essay into a book, nor from going well outside his field of expertise to write specifically on the resurgence of Islam. Soon after the September 11,2001, tragedy, Edward Said weighed in with a biting expose on Huntington's "clash of ignorance." Said rightly crushes the blatant political message inherent in the clash thesis, explaining why labels such as "Islam* and "the West" are unedifying: They mislead and confuse the mind, which is trying to make sense of a disorderly reality that won't be pigeonholed or strapped down as easily as all that."3°3 Exactly, but the same must therefore be true about Said's imagined discourse of Orientalism. Pigeonholing all previous scholars who wrote about Islam or Arabs into one negative category is discursively akin to Huntington's pitting of Westerners against Muslims. Said is right to attack this pernicious binary, but again he leaves it intact by not posing a viable alternative. Both Edward Said and Fouad Ajami, who rarely seem to agree on anything, rightly question the terms of Huntington's clash thesis. To relabel the Orient of myth as a Confucian-Islamic military complex is not only ethnocentric but resoundingly ahistorical. No competent historian of either Islam or Confucianism recognizes such a misleading civilizational halfbreed. Saddam Hussein's Iraq and Kim Jong Il's Korea could be equated as totalitarian states assumed to have weapons of mass destruction, but not for any religious collusion. This is the domain of Islamophobia in the United States that it "must be retired from public discourse before the people who like to use it actually begin to believe it."3°4 Unfortunately, many policy-makers and media experts talk and act as if they do believe it. The best way to defeat such simplistic ideology, I competing political ideologies, not the result of religious affiliation. And, as Richard Bulliet warns, the phrase "clash of civilizations* so readily stirs up is not to lapse into blame-casting polemics but to encourage sound scholarship of the real Orient that Said so passionately tried to defend. suggest, Impact AT: Endless War No risk of endless warfare Gray 7—Director of the Centre for Strategic Studies and Professor of International Relations and Strategic Studies at the University of Reading, graduate of the Universities of Manchester and Oxford, Founder and Senior Associate to the National Institute for Public Policy, formerly with the International Institute for Strategic Studies and the Hudson Institute (Colin, July, “The Implications of Preemptive and Preventive War Doctrines: A Reconsideration”, http://www.ciaonet.org/wps/ssi10561/ssi10561.pdf) 7. A policy that favors preventive warfare expresses a futile quest for absolute security. It could do so. Most controversial policies contain within them the possibility of In the hands of a paranoid or boundlessly ambitious political leader, prevention could be a policy for endless warfare. However, the American political system, with its checks and balances, was designed explicitly for the purpose of constraining the executive from excessive folly. Both the Vietnam and the contemporary Iraqi experiences reveal clearly that although the conduct of war is an executive prerogative, in practice that authority is disciplined by public attitudes. Clausewitz made this point superbly with his designation of the misuse. passion, the sentiments, of the people as a vital component of his trinitarian theory of war. 51 It is true to claim that power can be, and indeed is often, abused, both personally and nationally. It is possible that a state could acquire a taste for the apparent swift decisiveness of preventive warfare and overuse the option. One might argue that the easy success achieved against Taliban Afghanistan in 2001, provided fuel for the urge to seek a similarly rapid success against Saddam Hussein’s Iraq. In other words, the delights of military success can be habit forming. On balance, claim seven is not persuasive, though it certainly contains a germ of truth. A country with unmatched wealth and power, unused to physical insecurity at home—notwithstanding 42 years of nuclear danger, and a high level of gun crime—is vulnerable to demands for policies that supposedly can we ought not to endorse the argument that the United States should eschew the preventive war option because it could lead to a futile, endless search for absolute security. One might as well argue that the United States should adopt a defense policy and develop capabilities shaped strictly for homeland security approached in a narrowly geographical sense. Since a president might misuse a military instrument that had a global reach, why not deny the White House even the possibility of such misuse? In other words, constrain policy ends by limiting policy’s military means. This argument has circulated for many decades and, it must be admitted, it does have a certain elementary logic. It is the opinion of this enquiry, however, that the claim that a policy which includes the preventive option might lead to a search for total security is not at all convincing. Of course, folly in high places is always possible, which is one of the many reasons why popular democracy is the superior form of government. It would be absurd to permit the fear of a futile and dangerous quest for absolute security to preclude prevention as a policy option. Despite its absurdity, this rhetorical charge against prevention is a stock favorite among prevention’s critics. It should be recognized and dismissed for what it is, a debating point with little pragmatic merit. And strategy, though not always policy, must be nothing if not pragmatic. restore security. But Alt AT: Alt – Wright READ BLUE The alt’s all-or-nothing choice fails --- small reforms like the plan are key to institutional change and getting others to sign on to the alt Erik Olin Wright 7, Vilas Distinguished Professor of Sociology at the University of Wisconsin, “Guidelines for Envisioning Real Utopias”, Soundings, April, www.ssc.wisc.edu/~wright/Published%20writing/Guidelines-soundings.pdf 5. Waystations¶ The final guideline for discussions of envisioning real utopias concerns the importance of waystations. The central problem of envisioning real utopias concerns the viability of institutional alternatives that embody emancipatory values, but the practical achievability of such institutional designs often depends upon the existence of smaller steps, intermediate institutional innovations that move us in the right direction but only partially embody these values. Institutional proposals which have an all-or-nothing quality to them are both less likely to be adopted in the first place, and may pose more difficult transition-cost problems if implemented. The catastrophic experience of Russia in the “shock therapy” approach to market reform is historical testimony to this problem. ¶ Waystations are a difficult theoretical and practical problem because there are many instances in which partial reforms may have very different consequences than full- bodied changes. Consider the example of unconditional basic income. Suppose that a very limited, below-subsistence basic income was instituted: not enough to survive on, but a grant of income unconditionally given to everyone. One possibility is that this kind of basic income would act mainly as a subsidy to employers who pay very low wages, since now they could attract more workers even if they offered below poverty level¶ earnings. There may be good reasons to institute such wage subsidies, but they would not generate the positive effects of a UBI, and therefore might not function as a stepping stone.¶ What we ideally want, therefore, are intermediate reforms that have two main properties: first, they concretely demonstrate the virtues of the fuller program of transformation, so they contribute to the ideological battle of convincing people that the alternative is credible and desirable; and second, they enhance the capacity for action of people, increasing their ability to push further in the future. Waystations that increase popular participation and bring people together in problem-solving deliberations for collective purposes are particularly salient in this regard. This is what in the 1970s was called “nonreformist reforms”: reforms that are possible within existing institutions and that pragmatically solve real problems while at the same time empowering people in ways which enlarge their scope of action in the future. 1AR Case Afghanistan/Iraq Afghanistan in a ZOC Daskal ’13 - Fellow and Adjunct Professor, Georgetown Center on National Security and the Law University of Penn L. Rev., THE GEOGRAPHY OF THE BATTLEFIELD: A FRAMEWORK FOR DETENTION AND TARGETING OUTSIDE THE "HOT" CONFLICT ZONE, April, 2013, 161 U. Pa. L. Rev. 1165, Lexis Conversely, U.S. courts have often assumed that areas in which there is no active fighting between armed entities fall outside of the zone of active hostilities. Thus, the Al-Marri and Padilla litigations were premised on the notion that the two men were outside of the zone of active hostilities when [*1205] taken into custody in the United States. n125 The central issue in those cases was how much this distinction mattered. n126 The D.C. Circuit in Al Maqaleh similarly distinguished Afghanistan - defined as part of "the theater of active military combat" - from Guantanamo - described as outside of this "theater of war" presumably because of the absence of active fighting there. n127 In the context of the Guantanamo habeas litigation, D.C. District Court judges have at various times also described Saudi Arabia, Gambia, Zambia, Bosnia, Pakistan, and Thailand as outside an active battle zone. n128 Iraq is IN the ZOC Blank ’10 - Director, International Humanitarian Law Clinic, Emory University School of Law GEORGIA JOURNAL OF INTERNATIONAL AND COMPARATIVE LAW, VOLUME 39 2010 NUMBER 1, DEFINING THE BATTLEFIELD IN CONTEMPORARY CONFLICT AND COUNTERTERRORISM: UNDERSTANDING THE PARAMETERS OF THE ZONE OF COMBAT, Laurie R. Blank, http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1677965 At present, the overwhelming proportion of U.S. military forces are deployed to Afghanistan and Iraq and almost all actual combat operations are taking place in those two locales. There is little doubt that Afghanistan and Iraq form part of the zone of combat and a corresponding recognition that the entire territory of each country forms part of that zone of combat .55 The “global war on terror” is not limited to Afghanistan and Iraq, however. Identifying when other areas become a zone of combat—or form part of a broader zone of combat—as a result of terrorist attacks or subsequent military operations proves challenging and has significant legal and policy ramifications. AT: Circumvention No circumvention Daskal ’13 - Fellow and Adjunct Professor, Georgetown Center on National Security and the Law University of Penn L. Rev., THE GEOGRAPHY OF THE BATTLEFIELD: A FRAMEWORK FOR DETENTION AND TARGETING OUTSIDE THE "HOT" CONFLICT ZONE, April, 2013, 161 U. Pa. L. Rev. 1165, Lexis That said, there is a reasonable fear that any such court or review board will simply defer. In this vein, FISC's high approval rate is cited as evidence that reviewing courts or review boards will do little more than rubber-stamp the Executive's targeting decisions. n180 But the high approval rates only tell part of the story. In many cases, the mere requirement of justifying an application before a court or other independent review board can serve as an internal check, creating endogenous incentives to comply with the statutory requirements and limit the breadth of executive action. n181 Even if this system does little more than increase the attention paid to the stated requirements and expand the circle of persons reviewing the factual basis for the application, those features in and of themselves can lead to increased reflection and restraint. 1ar Ehlstain statements Prefer empirics and public statements---the aff presumes they know terrorists motives better than they do ELSHTAIN 2003 (Jean Bethke, Prof of Social and Political Ethics at U Chicago, Just War Against Terrorism, p. 94-95) Those who do not argue outright that the United States is the author of its own destruction often profess mystification at the motives of the attackers, despite the fact that the attackers have told us repeatedly what their motives are. The Nation editorialized, “Why the attacks Suddenly the far left is perplexed as well as isolationist: If we had not poked our nose in where it did not belong, maybe people would leave us alone. However, either we really do not know what drove the attackers—which requires that we ignore their words and those of Osama bin Laden—or we really do know what motivated the attackers—which also requires that we ignore their words and those of Osama bin Laden. Why? Because we cannot take the religious language seriously. Donald Kagan cites an took place is still unclear.” example of the latter when he recalls the words of a fellow Yale professor who opined tha thte “underlying causes” fo the 9/11 attacks were “the desperate, angry, and bereaved” circumstances of the lives of “these suicide pilots,” who were responding to “offensive cultural messages” spread by the There is considerable hubris on display in such assertions of certainly about what drives terrorists, when doing so requires ignoring the terrorists’ own words. This scenario usually plays out like this: First, one professes ignorance of the real motives, although one can do so only if one ignores the words of the attackers, who have scarcely been secretive. Or second, one ignores the real motives because one knows better than the attackers themselves what their motives were. “What is striking about such statements is their arrogance,” writes Kagan. “They suggest that he enlightened commentator can penetrate the souls of the attackers and know their deepest motives…A far better guide might be the actual statements of the perpetrators .” Kagan is not alone in this observation. Tony Judt writes that Osama bin Laden’s stated motives are “to push the ‘infidel’ out of the Arabian peninsula, to punish the ‘Crusaders and the Jews,’ and to wreak revenge on Americans for their domination of Islamic space.” Judt cannot help noticing, however, that bin Laden “is not a spokesman for the downtrodden, much less those who seek just solutions to real dilemmas —he is United States. cuttingly dismissive of the UN: ‘Muslims should not appeal to these atheist, temporal regimes.’” Not surprisingly, Salman Rushdie, the Muslim writer against whom a fatwa ordering his death was issued in 1989, makes the trenchant observation that the savaging of America by sections of the left…has been among the most unpleasant consequences of the terrorists’ attacks on the United States. “The problem with Americans is…”—“What America needs to understand…” There has been a lot of sanctimonious moral relativism around lately, usually prefaced by such phrases as these. A country which has just suffered the most devastating terrorist attack in history, a country in a state of deep mourning and horrible grief, is being told, heartlessly, that it is to blame for its own citizens’ deaths. The New York Times columnist Thomas Friedman expresses amazement at the ease with which some people abroad and at campus teach-ins now tell us what motivated the terrorists…Their deed was their note: we want to destroy America, starting with its military and financial centers. Which part of that sentence don’t people understand? Have you ever seen Osama bin Laden say, “I just want to see a smaller Israel in its pre-1967 borders,” or “I have no problem with America, it just needs to have a lower cultural and military profile in the Muslim world?” These terrorists aren’t out for a new kind of coexistence with us. They are out for our non-existence. None of this seems to have seeped into the “Yes, but…” crowd. Expertise Yes technical capacity---intel assessments prove and it’s not that hard John P. Holdren 7, et al * Former prof at Harvard’s Kennedy School of Government, director of the Science, Technology, and Public Policy Program at the School's Belfer Center for Science and International Affairs, and Director of the Woods Hole Research Center; currently senior advisor to President Barack Obama on science and technology issues. ** Anthony Wier, Former Research Associate, Project on Managing the Atom/Science, Technology, and Public Policy Program, Harvard’s Belfer Center for Science and International Affairs. ***Matthew Bunn, Professor of Practice; Co-Principal Investigator, Project on Managing the Atom, Harvard’s Belfer Center for Science and International Affairs. "Securing The Bomb: 2007” September, Project on Managing the Atom, Belfer Center for Science and International Affairs, Commissioned by the Nuclear Threat Initiative, www.nti.org/securingthebomb ***elipses in orig If terrorists could obtain the HEU or plutonium that are the essential ingredients of a nuclear bomb, making at least a crude nuclear bomb might well be within the capabilities of a sophisticated group.17 One study by the now-defunct congressional Office of Technology Assessment summarized the threat: “A small group of people, none of whom have ever had access to the classified literature, could possibly design and build a crude nuclear explosive device... Only modest machine-shop facilities that could be contracted for without arousing suspicion would be required.”18 The simplest type of nuclear bomb for terrorists to build would be a so-called “gun-type” bomb, which involves little more than slamming two pieces of HEU together at high speed. The bomb that incinerated the Japanese city of Hiroshima, for example, was a cannon that fired a shell of HEU into rings of HEU. In most cases, building such a bomb would require some ability to cast and machine uranium, a reasonable knowledge of the nuclear physics involved, and a good understanding of cannons and ballistics. In many cases, an ability to do some chemical processing might also be needed (for example, to dissolve research reactor fuel containing HEU in acid, separate the HEU, and reduce the HEU to metal); but the chemical processing required is less sophisticated than some of the processing criminals routinely do in the illegal drug industry.20 It is impossible, however, to get a substantial nuclear yield from a gun-type bomb made from plutonium, because the neutrons always being emitted by the plutonium will set off the nuclear chain reaction prematurely, causing the bomb to blow itself apart. Hence, if the terrorists only had plutonium available (or did not have enough HEU for a gun-type bomb, which requires a large amount of material), terrorists who wanted a substantial nuclear yield would have to attempt the more difficult job of making an “implosion-type” device, in which explosives arranged around nuclear material compress it to a much higher density, setting off the nuclear chain reaction. While the terrorists’ likelihood of success in making such a bomb would be lower, the danger cannot by any means be ruled out. Hence, plutonium separated from spent nuclear fuel, like HEU, must be protected from theft and transfer to terrorists.21 Even before the Afghan war, U.S. intelligence concluded that “fabrication of at least a ‘crude’ nuclear device was within al-Qa’ida’s capabilities, if it could obtain fissile material.”22 Documents later seized in Afghanistan provided “detailed and revealing” information about the progress of al Qaeda’s nuclear efforts that had not been available before the war.23 As alMuhajir’s statement calling for nuclear experts to join the jihad suggests, al Qaeda has consistently attempted to recruit people with nuclear weapons expertise. Former CIA chief Tenet, in his memoir, recounts his conversation with Pervez Musharraf, in which the Pakistani presi- dent assured Tenet that Pakistani nuclear experts had dismissed the possibility that “men hiding in caves” could build a nuclear bomb. “Mr. President, your experts are wrong,” Tenet says he replied, recounting the relative ease of making a crude “gun-type” nuclear bomb, and al Qaeda’s efforts to get help from Pakistani nuclear scientists associated with Ummah Tameer-iNau (UTN), a group led by Mahmood, the lead scientist who sat down with bin Laden and Zawahiri to discuss nuclear weapons.24 The overthrow of the Taliban and the disruption of al Qaeda’s old central com- mand structure reduced the probability that al Qaeda would be able to pull off an operation as large and complex as acquir- ing nuclear bomb material and putting together a nuclear weapon. Unfortunately, however, the latest intelligence assessments suggest that al Qaeda’s central command is reconstituting its ability to direct complex operations, from the border areas of Pakistan.25 As then- Director of National Intelligence John Negroponte put it in his annual threat assessment in January 2007, al Qaeda’s “ core leadership… continue to plot attacks against our Homeland and other targets with the objective of inflicting mass casualties. And they continue to maintain active connections and relationships that radiate outward from their leaders’ secure hideout in Pakistan to affiliates through- out the Middle East, northern Africa, and Europe.” Negroponte specifically warned that while use of conventional explosives continues to be “the most probable” kind of al Qaeda attack, U.S. intelligence continues to “receive reports indicating that al Qaeda and other terrorist groups are attempting to acquire chemical, biological, radiological and nuclear weapons or material.”26 Unfortunately, the physics of the problem suggests that a terrorist cell of relatively modest size, with no large fixed facilities that would draw attention, might well be able to make a crude nuclear bomb—and the world might never know until it was too late.27 AT: No Nuke Winter Nuclear war causes extinction Wickersham ’10 - University of Missouri adjunct professor of Peace Studies and a member of The Missouri University Nuclear Disarmament Education Team, author book about nuclear disarmament education (Bill, 4/11/10, “Threat of ‘nuclear winter’ remains New START treaty is step in right direction.” http://www.columbiatribune.com/news/2010/apr/11/threat-of-nuclearwinter-remains/) In addressing the environmental consequences of nuclear war, Columbian Steve Starr has written a summary of studies published by the Bulletin of the International Network of Engineers and Scientists Against Proliferation, which concludes: “U.S. researchers have confirmed the scientific validity of the concept of ‘nuclear winter’ and have demonstrated that any conflict which targets even a tiny fraction of the global arsenal will cause catastrophic disruptions of the global climate.” In another statement on his Web site, Starr says: “If 1% of the nuclear weapons now ready for war were detonated in large cities, they would utterly devastate the environment, climate, ecosystems and inhabitants of Earth. A war fought with thousands of strategic nuclear weapons would leave the Earth uninhabitable.” K Turns Any attack turns the K Peter Beinart 8, associate professor of journalism and political science at CUNY, The Good Fight; Why Liberals – and only Liberals – Can Win the War on Terror and Make America Great Again, 110-1 Indeed, while the Bush administration bears the blame for these hor- rors, White House officials exploited a shift in public values after 9/11. When asked by Princeton Survey Research Associates in 1997 whether stopping terrorism required citizens to cede some civil liberties, less than one-t hird of Americans said yes. By the spring of 2002, that had grown to almost three- quarters. Public support for the government’s right to wire- tap phones and read people’s mail also grew exponentially. In fact, polling in the months after the attack showed Americans less concerned that the Bush administration was violating civil liberties than that it wasn’t violating them enough. What will happen the next time? It is, of course, impossible to predict the reaction to any particular attack. But in 2003, the Center for Public Integrity got a draft of something called the Domestic Security Enhance- ment Act, quickly dubbed Patriot II. According to the center’s executive director, Charles Lewis, it expanded government power five or ten times as much as its predecessor. One provision permitted the government to strip native-born Americans of their citizenship, allowing them to be indefinitely imprisoned without legal recourse if they were deemed to have provided any support—even nonviolent support—to groups designated as terrorist. After an outcry, the bill was shelved. But it offers a hint of what this administration—or any administration—might do if the United States were hit again. ¶ When the CIA recently tried to imagine how the world might look in 2020, it conjured four potential scenarios. One was called the “cycle of fear,” and it drastically inverted the assumption of security that C. Vann Woodward called central to America’s national character. The United States has been attacked again and the government has responded with “large- scale intrusive security measures.” In this dystopian future, two arms dealers, one with jihadist ties, text- message about a potential nuclear deal. One notes that terrorist networks have “turned into mini-s tates.” The other jokes about the global recession sparked by the latest attacks. And he muses about how terrorism has changed American life. “ That new Patriot Act,” he way beyond anything imagined after 9/11.” “The fear cycle generated by an increasing spread of WMD and terrorist attacks,” comments the CIA report, “once under way, would be one of the hardest to break.” And the more entrenched that fear cycle grows, the less free America will become. Which is why a new generation of American liberals must make the fight against this new totalitarianism their own. writes, “went AT: Onto First No onto first Friedrich Kratochwil 8, is Assistant Professor of International Relations at Columbia University, Pragmatism in International Relations “Ten points to ponder about pragmatism” p11-25 First, a pragmatic approach does not begin with objects or ‘things’ (ontology), or with reason and method (epistemology), but with ‘acting’ (prattein), thereby preventing some false starts. Since, as historical beings placed in a specific situations, we do not have the luxury of deferring decisions until we have found the ‘truth’ we have to act and must do so always under time pressures and in the face of incomplete information. Precisely because the social world is characterized by strategic interactions, what a situation ‘is’, is hardly ever clear ex ante, since it is being ‘produced’ by the actors and their interactions, and the multiple possibilities are rife with incentives for (dis)information. This puts a premium on quick diagnostic and cognitive shortcuts informing actors about the relevant features of the situation, and on leaving an alternative open (‘plan B’) in case of unexpected difficulties. Instead of relying on certainty and universal validity gained through abstraction and controlled experiments, we know that completeness and attentiveness to detail, rather than to generality, matter. To that extent, likening practical choices to simple ‘discoveries’ of an already independently existing ‘reality’ disclosing itself to an ‘observer’–or relying on optimal strategies – is somewhat heroic. These points have been made vividly by ‘realists’ such as Clausewitz in his controversy with von Buelow, in which he criticized the latter’s obsession with a strategic ‘science’ (Paret et al. 1986). While Clausewitz has become anicon for realists, a few of them (usually dubbed ‘old’ realists) have taken seriously his warnings against the misplaced belief in the reliability and usefulness of a ‘scientific’ study of strategy. Instead, most of them, especially ‘neorealists’ of various stripes, have embraced the ‘theory’-building based on the epistemological project as the via regia to the creation of knowledge. A pragmatist orientation would most certainly not endorse such a position. Second, since acting in the social world often involves acting ‘for’ someone, special responsibilities arise that aggravate both the incompleteness of knowledge as well as its generality problem. Since we owe special care to those entrusted to us, for example, as teachers, doctors or lawyers, we cannot just rely on what is generally true, but have to pay special attention to the particular case. Aside from avoiding the foreclosure of options, we cannot refuse to act on the basis of incomplete information or insufficient knowledge, and the necessary diagnostic will involve typification and comparison, reasoning by analogy rather than generalization or deduction. Leaving out the particularities of a case, be it a legal or medical one, in a mistaken effort to become ‘scientific’ would be a fatal flaw. Moreover, there still remains the crucial element of ‘timing’ – of knowing when to act. Students of crises have always pointed out the importance of this factor but, in attempts at building a general ‘theory’ of international politics analogously to the natural sciences, such elements are neglected on the basis of the ‘continuity of nature’ and the ‘large number’ assumptions. Besides, ‘timing’ seems to be quite recalcitrant to analytical treatment. Third, the cure for anxiety induced by Cartesian radical doubt does not consist in the discovery of a ‘foundation’ guaranteeing absolute certainty. This is a phantasmagorical undertaking engendered by a fantastic starting point, since nobody begins with universal doubt! (Peirce 1868). Rather, the remedy for this anxiety consists in the recognition of the unproductive nature of universal doubt on the one hand, and of the fetishization of ‘rigour’ on the other. Letting go of unrealizable plans and notions that lead us to delusional projects, and acquiring instead the ability to ‘go on’ despite uncertainties and the unknown, is probably the most valuable lesson to learn. Beginning somewhere, and reflecting critically on the limitations of the starting point and the perspective it opened, is likely to lead to a more fruitful research agenda than starting with some preconceived notions of the nature of things, or of ‘science’, and then testing the presumably different (but usually quite similar) theories (such as liberalism and realism). After all, ‘progress’ in the sciences occurred only after practitioners had finally given up on the idea that in order to say something about the phenomena of the world (ta onta), one had to grasp first ‘being’ itself (to ontos on). Fourth, by giving up on the idea that warranted knowledge is generated either through logical demonstration or through the representation of the world ‘out there’, a pragmatic starting point not only takes seriously the always preliminary character of knowledge, it also promises that we will learn to follow a course of action that represents a good bet.7 Thus, it accounts for changes in knowledge in a more coherent fashion. If the world were ‘out there’, ready-made, only to be discovered, scientific knowledge would have to be a simple accumulation of more and more true facts, leading us virtually automatically closer and closer to ‘the TRUTH’. Yet, if we have learned anything from the studies of various disciplines, it is the fact that progress consists in being able to formulate new questions that could not even be asked previously. Hence, whatever we think of Kuhn’s argument about ‘paradigms’, we have to recognize that in times of revolutionary change the bounds of sense are being redrawn, and thus the newly generated knowledge is not simply a larger sector of the encircled area (Kratochwil 2000). Fifth, pragmatism recognizes that science is social practice, which is determined by rules and in which scientists not only are constitutive for the definitions of problems (rather than simply lifting the veil from nature), but they also debate seemingly ‘undecidable’ questions and weigh the evidence, instead of relying on the bivalence principle of logic as an automatic truth-finder (Ziman 1991; Kratochwil 2007a). To that extent, the critical element of the epistemological project is retained, but the ‘court’, which Kant believed to be reason itself, now consists of the practitioners themselves. Instead of applying free-standing epistemological standards, each science provides its own court, judging the appropriateness of its methods and practices. Staying with the metaphor of a court, we also have to correct an implausible Kantian interpretation of law – that it has to yield determinate and unique decisions. We know from jurisprudence and case law that cases can be decided quite differently without justifying the inference that this proves the arbitrariness of law. Determinacy need not coincide with uniqueness, either in logic (multiple equilibria), science (equifinality) or law – Ronald Dworkin (1978) notwithstanding! Sixth, despite the fact that it is no longer a function of bivalent truth conditions, or anchored neither in the things themselves (as in classical ontology) nor in reason itself, ‘truth’ has not been abolished or supplanted by an ‘anything goes’ attitude. Rather, it has become a procedural notion of rulefollowing according to community practices, since nobody can simply make the rules as she or he goes along. These rules do not ‘determine’ outcomes, as the classical logic of deductions or truth conditions suggest, but they do constrain and enable us in our activities. Furthermore, since rule-following does not simply result in producing multiple copies of a fixed template, rules provide orientation in new situations, allowing us to ‘go on’, making for both consistency and change. Validity no longer assumes historical universality, and change is no more conceived of as temporal reversibility, as in differential equations, where time can be added and multiplied, compared with infinity, and run towards the past or the future. Thus ‘History’ is able to enter the picture, and it matters because, differently from the old ontology, change can now be conceived of as a ‘path-dependent’ development, as a (cognitive) evolution or even as radical historicity, instead of contingency or decay impairing true knowledge. Consequently, time-bound rather than universal generalizations figure prominently in social analysis, and as Diesing, a philosopher of science, reminds us, this is no embarrassment. Being critical of the logical positivists’ search for ‘laws’ does not mean that only single cases exist and that no general statements are possible. It does mean, however, that in research: there are other goals as well and that generality is a matter of degree. Generalizations about US voting behaviour can be valid though they apply only between 1948–72 and only to Americans. Truth does not have to be timeless. Logical empiricists have a derogatory name for such changing truths (relativism); but such truths are real, while the absolute, fully axiomatized truth is imaginary. (Diesing 1991:91) Seventh, the above points show their importance when applied not only to the practices of knowledge generation but also to the larger problem of the reproduction of the social world. Luhmann (1983) suggested how rule-following solves the problem of the ‘double contingency’ of choices that allows interacting parties to relate their actions meaningfully to each other. ‘Learning’ from past experience on the basis of a ‘tit for tat’ strategy represents one possibility for solving what, since Parsons, has been called the ‘Hobbesian problem of order’. This solution, however, is highly unstable, and thus it cannot account for institutionalized behaviour. The alternative to learning is to forgo ‘learning’. Actors must abstract from their own experiences by trusting in a ‘system of expectations’ which is held to be counterfactually valid. ‘Institutionalization’ occurs in this way, especially when dispute-settling instances emerge that are based on shared expectations about the system of expectations. Thus, people must form expectations about what types of arguments and reasons are upheld by ‘courts’ in case of a conflict (Luhmann 1983). Eighth, a pragmatic approach, although sensitive to the social conditions of cognition, is not simply another version of the old ‘sociology of knowledge’, let alone of utilitarianism by accepting ‘what works’ or what seems reasonable to most people. It differs from the old sociology of knowledge that hinged on the cui bono question of knowledge (Mannheim 1936), since no argument about a link between social stratification and knowledge is implied, not to mention the further-reaching Marxist claims of false consciousness. A pragmatist approach, however, is compatible with such approaches as Bourdieu’s (1977) or more constructivist accounts of knowledge production, such as Fuller’s (1991) social epistemology, because it highlights the interdependence of semantics and social structures. Ninth, as the brief discussion of ‘science studies’ above has shown, it is problematic to limit the problem of knowledge production to ‘demonstrations’ (even if loosely understood in terms of the arguments within the scientific community), thus neglecting the factors that are conducive to (or inhibitive of) innovation in the definition of problems. To start with, antecedent to any demonstration, there has to be the step of ‘invention’, as the classical tradition already suggested. In addition, although it might well be true that ‘invention’ does not follow the same ‘logic’ as ‘testing’ or demonstrating, this does not mean that these considerations are irrelevant or can be left outside the reflection on how knowledge is generated. To attribute originality solely to a residual category of a rather naively conceived individual ‘psychology of discovery’, as logical positivism does, will simply not do. After all, ‘ideas’ are not representations and properties of the individual mind, but do their work because they are shared; innovation is crucially influenced by the formal and informal channels of communication within a (scientific) community. While the logical form of refutability in principle is, for logical positivists, a necessary element of their ‘theoretical’ enterprise, it does not address issues of creativity and innovation, which are a crucial part of the search for knowledge. Corroborating what we already suspected is interesting only if such inquiries also lead to novel discoveries, since nobody is served by ‘true’ but trivial results. Quite clearly, the traditional epistemological focus is much too narrow to account for and direct innovative research, while pragmatic approaches have notoriously emphasized the creativity of action (Rochberg-Halton 1986). Tenth, the above discussion should have demonstrated that a pragmatic approach to knowledge generation is not some form of ‘instrumentalism’ á la Friedman (1968), perhaps at basement prices, or that it endorses old wives’ tales if they generated ‘useful predictions’, even though for rather unexplainable reasons. Thus, buying several lottery tickets on the advice of an acquaintance to rid oneself of debts and subsequently hitting the jackpot neither qualifies as a pragmatically generated solution to a problem nor does it make the acquaintance a financial advisor. Although ‘usefulness’ is a pragmatic standard, not every employment of it satisfies the exacting criteria of knowledge production. As suggested throughout this chapter, a coherent pragmatic approach emphasizes the intersubjective and critical nature of knowledge generation based on rules, and it cannot be reduced to the de facto existing (or fabricated) consensus of a concrete group of scientists or to the utility of results, the presuppositions of which are obscure because they remained unexamined. Conclusions No long summary of argument is necessary here. Simply, a pragmatic turn shows itself to be consistent with the trajectory of a number of debates in the epistemology of social sciences; it also ties in with and feeds into the linguistic, constructivist and ‘historical’ turns that preceded it; and finally, it is promising for the ten reasons listed above. While these insights might be useful correctives, they do not by themselves generate viable research projects. This gain might have been the false promise of the epistemological project and its claim that simply following the path of a ‘method’ will inevitably lead to secure knowledge. Disabusing us of this idea might be useful in itself because it would redirect our efforts at formulating and conceptualizing problems that are antecedent to any ‘operationalization’ of our crucial terms (Sartori 1970), or of any ‘tests’ concerning which ‘theory’ allegedly explains best a phenomenon under investigation.